Social Engineering Techniques & Other Attack Types Flashcards

1
Q

What are the variants of phishing

A

Spear Phishing, Whaling, Vishing, Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Spear Phishing?

A

Phishing that targets certain employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Whaling?

A

Phishing that targets high-level employees or senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing?

A

Phishing that targets cell phones, telephones, and VoIP systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Smishing

A

Phishing that uses SMS texting as the vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a Visher do?

A

Vishing Attacks, like make a call spoofing the collection agency or claiming to be a lawyer trying to get personal information or personal health information or intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the key indicators to identify phishing in email?

A

Vague salutations - dear valued customer or dear employee
Suspicious looking domain names or display names - potentially misspelled
URL Paths or Hypertext with different actual link/IP address
Awkward Grammar
Urgent or intimidating subject line
Lack of contact info
Spoofed headers/logos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a phishing attack?

A

A cyber attack that uses disguised email as a vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the goal of a phishing attack?

A

To trick the recipient into believing that the message is legitimate so they will click a link or download an attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does BEC stand for?

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Business Email Compromise?

A

BEC is a form of attack that targets companies who outsource, conduct wire transfers, and have suppliers abroad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the common BEC schemes

A

phony invoices and transfers
c-suite fraud
email or webmail account compromise
attorney impersonation or hoaxing
data theft of personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming?

A

-blending of the words ‘phishing’ and ‘farming’ that describes a type of cybercrime like phishing
-happens when a website’s traffic is manipulated or spoofed, and confidential information is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can a pharming attack happen?

A

-attackers may install a virus or trojan on a target that changes the computer’s hosts file to direct traffic away from its intended target and toward a fake web site
-crackers may also poison a DNS server to re-direct multiple users to unintentionally go to the fake site, which in turn can be used to install malware on the victim’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spam?

A

a slang term for unsolicited commercial email or junk email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the common types of email spam?

A

-advertisements
-chain letters
-spoofed emails relating to phishing campaigns
-hoaxes and money scams (ex. Nigernan prince)
-malware warnings
-unwanted porn email

17
Q

What is a Negative SEO?

A

A “Negative SEO” search engine optimization attack is a form of spam that can actually hurt your business. It could be a competitor making Google think that you’re up to no good.

18
Q

Name the common categories of spam

A

-email spam
-comment spam
-trackback spam
-negative SEO attacks
-spiders and Distriubuted Denial of Service(DDoS) (bots)

19
Q

What is SPIM?

A

-spam overt instant messaging
-unsolicited instant messages

20
Q

Why is Spim harmful?

A

-disrupts chatting
-can contain viruses or spyware

21
Q

How can you prevent spim?

A

-blocking any messages from sources not on your contact list
-most anti-virus programs include spam and spim protection features

22
Q

What is typosquatting?

A

-aka URL hijacking, sting sites, or fake URL
-involves sitting on sites under someone else’s brand or copywrite and targeting internet users who erroneously type a web site address into their browser address bar
-ex: facebool, gooogle, amason

23
Q

What is tailgating/piggybacking?

A

When a physical access token meant for one person is used for two people, whether or not the person scanning knows

-access tokens/badges in this scenario are being used in a single-factor or multi-factor authentication scheme for physical access to buildings, rooms, or certain high security areas like data centers
-considered a violation of a security policy (AUP) combined with some enforcement policy if users do not comply

24
Q

What is dumpster diving?

A

an attack where the goal is to reclaim important information by searching though trash containers and dumpsters

25
Q

What information can attackers get through dumpster diving?

A

-credit card info
-invoices/receipts
-IP addressing
-org charts
-names of key employees
-manuals and charts
-memos and sticky notes

26
Q

How can you prevent dumpster diving>

A

-fenced in
-locked
-good lighting
-monitoring, like cameras

27
Q

What is shoulder surfing?

A

attack where the goal is to look over the shoulder of someone as they enter a password or a PIN

28
Q

What makes shoulder surfing easier?

A

-camera-equipped mobile devices
-binoculars & telescopes let people see screens and keyboards from nearby buildings

29
Q

What is a watering hole attack?

A

attack that leverages a compromised web server in order to target groups or associations in social networks

only members of the association are attacked, while other traffic is untouched

30
Q

Why are watering holes difficult to identify?

A

even with traffic analysis, most traffic from the infected site is benign / unaffected

31
Q

What are typical goals of scams or attacks?

A

theft of financials, intellectual property, personal identifiable information, or personal health information

32
Q

What’s the first step of most scams?

A

Remote IP spoofing

33
Q

What’s the second step of most scams?

A

phones, email, sms, im

34
Q

What’s the third step of most scams?

A

masquerading as a legitimate entity

35
Q

Name different forms of scams/fraud

A

-eliciting info and reconnaissance
-hoaxes (pretending to be someone )
-identity fraud (fake documents)
-impersonation and pretending (access to financial info)
-invoice scams
-credential harvesting (gathering usernames and passwords)

36
Q

What can you do if you see someone looking suspicious?

A

Politely ask for identification or authorization (like a guest badge) if your company policy does not restrict confrontation , or contact security

37
Q

What is an influence campaign?

A

AKA misinformation operation / influence operation

collect tactical info about adversary, locate key influences or stakeholders, launch propaganda/disinformation initiative, gain competitive advantage or confuse adversary

38
Q
A