Social Engineering Attacks Flashcards
1
Q
Effective social engineering
A
- Constantly changing
- You never know what they’ll use next
- May involve multiple people
- And multiple organizations
- There are ties connecting many organizations
- May be in person or electronic
- Phone calls from aggressive “customers”
- Emailed funeral notifications of a friend or associate
2
Q
Social engineering principles
A
• Authority
• The social engineer is in charge
• I’m calling from the help desk/office of the
CEO/police
• Intimidation
• There will be bad things if you don’t help
• If you don’t help me, the payroll checks won’t be
processed
- Consensus / Social proof
- Convince based on what’s normally expected
- Your co-worker Jill did this for me last week
- Scarcity
- The situation will not be this way for long
- Must make the change before time expires
- Urgency
- Works alongside scarcity
- Act quickly, don’t think
- Familiarity / Liking
- Someone you know, we have common friends
- Trust
- Someone who is safe
- I’m from IT, and I’m here to help
3
Q
Phishing
A
- Social engineering with a touch of spoofing
- Often delivered by spam, IM, etc.
- Very remarkable when well done
• Don’t be fooled - Check the URL
- Usually there’s something not quite right
- Spelling, fonts, graphics
- Vishing is done over the phone
- Fake security checks or bank updates
4
Q
Spear phishing
A
- Phishing with inside information
- Makes the attack more believable
- Spear phishing the CEO is “whaling”
5
Q
Shoulder surfing
A
• You have access to important information
• Many people want to see
• Curiosity, industrial espionage, competitive
advantage
- This is surprisingly easy
- Airports / Flights
- Hallway-facing monitors
- Coffee shops
- Surf from afar
- Binoculars / Telescopes
- Easy in the big city
- Webcam monitoring
6
Q
Tailgating
A
- Use someone else to gain access to a building
- Not an accident
- Johnny Long / No Tech Hacking
- Blend in with clothing
- 3rd-party with a legitimate reason
- Temporarily take up smoking
- I still prefer bringing doughnuts
- Once inside, there’s little to stop you
- Most security stops at the border
7
Q
Dumpster diving
A
- Mobile garbage bin
- United States brand name “Dumpster”
- Similar to a rubbish skip
- Important information thrown out with the trash
- Thanks for bagging your garbage for me!
- Gather details that can be used for a different attack
- Impersonate names, use phone numbers
- Timing is important
- Just after end of month, end of quarter
- Based on pickup schedule
8
Q
Phishing scams targeting a specific group of people are referred to as:
A
Spear phishing