Social Engineering and Physical Security Flashcards
Social Engineering Phases
- Research (dumpster dive, visit websites, tour the company)
- Select the victim (identify frustrated employees)
- Develop a relationship
- Exploit the relationship (collect sensitive information)
Why do social engineering attacks work?
Human nature - trusting
Ignorance of social engineering efforts
Fear (of consequences for not providing the requested information)
Greed (promised gain for providing the requested information)
A sense of moral obligation
Insufficient training
Unregulated information or physical access
Complex organizational structure
Lack of security policies
Halo effect = a single human trait influences the perception of other traits, an attractive person, a smile
Human based social engineering attacks
Information gathering through conversation
Dumpster Diving - TRASHINT
Impersonation
Posing as a user and requesting a password reset
Authority support - posing as a support professional and requesting a user reset their password to one provided by the attacker
Shoulder surfing - up close or long distance observation
Eavesdropping
Tailgating - have a fake badge and follow in someone with a valid badge
Piggybacking - no fake badge, just follow someone in
RFID identity theft
Also known as RFID skimming
Reverse social engineering
Advertising that you are the support and wait for a user to contact you for help. Inside to outside communication is always more trusted than outside to inside communication
Insider attacks
Disgruntled employees
Computer Based Attacks
Malicious Pop Ups
Fake AV or Rogue Security
Phishing: To mitigate:
1. Beware unknown, unexpected or suspicious originators
2. Be aware of whom the email is addressed to
3. Verify phone numbers
4. Beware bad spelling or grammar
5. Always check links
6. Use tools like Netcraft Toolbar and Phishtank Toolbar
Spear Phishing
Targeted phishing attack against an individual. If targeted against high-level targets within an organization, it is called whaling
Pharming
The use of malicious code of some sort that redirects a user’s web traffic, also known as phishing without a lure
Spimming
Spam messages over instant messaging
Sign in seal
An email protection method that uses a secret-message or image that can be referenced on any official communication within the site. This sign-in seal is kept locally on your computer so no one can copy or spoof it.
Phishing Countermeasures
Set up multiple layers of defense Change management procedures Strong authentication measures Promoting policies and procedures User education - is the most effective
Mobile Based Attacks
ZitMo (Zeus in the middle) - android malware that asked a banking user to install two factor authentication that was in actuality the malware
Mobile based social engineering attacks
- Publishing malicious apps
- Repackaging legitimate apps
- Fake security applications
- SMS - fake security notifications that prompt the victim to call a support number, also known as smishing
Physical security measures
All the things that you can touch like fences and gates