Social Engineering Techniques & Other Attack Types Flashcards
Name four types of phishing
- spearphishing (targets specific employees)
- whaling (targets high level employees, executives, or senior management)
- smishing (SMS phishing)
- vishing (voice phishing, targets cell phones, telephones or voip)
What is phishing?
a cyber attack that uses disguised email or other communication channel as a vector
Common phishing indicators
1) Vague salutations: for example, dear valued customer or dear employee
2) Suspicious-looking domain names/display names
3) URL Paths: for example, the company name is actually farther down into the url path or the domain is a common misspelling.
4) Wrong hypertext
5) Awkward grammar
6) Urgency in text
7) Lack of contact info
8) Spoofed headers/logos
Define Business Email Compromise (BEC)
This is a form of attack that targets companies who outsource, conduct wire transfers and have suppliers abroad. They often target corporate email accounts of high level employees. They’re either spoofed or compromised through tools known as keyloggers or other phishing attacks to perform fraudulent transfers.
Common BEC Schemes
Phony invoices and transfers
“C-suite” or “C-Team” fraud (impersonate the CEO)
E-mail or webmail account compromise
Attorney impersonation and hoaxing
Data theft of personally identifiable information (PII)
What is pharming?
a website’s traffic is manipulated or spoofed, and confidential information is stolen.
may be accomplished using a trojan or other virus that changes the computer’s host file to direct traffic away from it’s target and toward a fake website.
crackers may also poison a DNS server to re-direct multiple users to unintentionally go to the fake site, which can be used to install malware on their computers.
For the exam, remember that pharming has to do with name resolution or DNS (domain name system).
Spam
slang term for unsolicited commercial email or junk email
common categories of spam
email spam comment spam trackback spam negative SEO attack spiders and DDoS (bots)
Spim
Spam over instant messaging
disrupts chatting and can contain viruses or spyware
by blacking any messages from sources not on your contact list, you can prevent spim
most anti-virus programs include both spam and spim protection features
Typosquatting
Involves sitting on sites under someone else’s brand or copyright and targeting internet users who erroneously type a web site address into their browser address bar
other names for typo squatting are URL hijacking, sting sites, or fake URL
ex. - facebool, gooogle, amason
Tailgating
also called piggybacking
occurs when access tokens or badges are being used in a single-factor or multi-factor authentication scheme for physical access to buildings, rooms, or certain high security areas such as data centers
each subject uses their badge or token with the sensor every time they access a building or protected area
often considered a violation of security policy (AUP/acceptable use policy) combined with some enforcement policy if users do not comply
dumpster diving
credit card information invoices and receipts ip addresses organization charts names of key employees manuals and charts memos and sticky notes hard drives removable storage phone numbers
shoulder surfing
goal is to look over the shoulder as he or she enters password or PIN
easier to carry out today with spy cam technology and camera-equipped mobile devices
binoculars and telescopes from nearby buildings can see screens and keyboards
watering hole
leverage a compromised webserver in order to target groups or associations in social networks
only members of the association are attacked, while other traffic is untouched
can be difficult to identify using traffic analysis since most traffic from the infected site is benign
EXAM QUESTION
Why is social engineering so effective?
six reasons
1) lack of proper security and awareness training
2) inadequate acceptable use policy (AUP)
3) no buy-in from management and employees for prevention measures
4) no enforcement of policies - no carrot and no stick
5) outdated anti-virus, outdated DLP (data leakage prevention), and mobile device application management tools
6) poor perimeter security controls for e-mail, messaging, telephony, and web activities
difference between malware and exploit
all malware are exploits, but not all exploits involve malware/malicious code
Common types of malware
1) PUPs (potentially unwanted programs)
2) Ransomware
3) Trojans and RATs
4) Worms
5) Spyware and adware
6) Keyloggers
RATs
Remote access trojans
often part of multi-staged exploits
1) create backdoors
2) establish Command & Control communication with a backend server (we call these “botnets”
3) some well known RATs include Ghost, Poison Ivy, PlugX, and Sakula
4) Now on mobile devices
PlugX is now a common choice for nationstates which are using RATs as their payload
PUPs
Potentially unwanted programs
PUAs
Potentially unwanted apps
Ransomware
encrypts key files and holds them for ransom from the target organization.
usually demands crypto such as Bitcoin or Monero, which are difficult to track
cryptolocker toolkits have exploded since Gpcoder in 2005
average ransom demand has more than doubled
over 30 percent of victims are in the U.S.
newest trend is Ransomware-as-a-Service (Raas) on dark net, which is a subset of Maas (Malware-as-a-Service)
Steps of a ransomware campaign
1) installation: crypto-ransomware installs itself after bootup
2) contacting headquarters: malware contacts a server belonging to an attacker or group
3) handshake and keys: the ransomware client and server “handshake” and the server generates two cryptographic keys
4) encryption: the ransomware starts encrypting every file it finds with common file extensions
5) extortion: a screen displays giving a time limit to pay up before criminals destroy the key to decrypt the files
Trojans
Trojan horses have no replicating abilities like viruses or worms
They are malicious code and programs that masquerade as legitimate applications or are embedded in real programs
Trojan sources
Games Utilities and tools Device drivers Patches & updates Free/shareware System upgrades