Social Engineering Techniques & Other Attack Types Flashcards

1
Q

What are the variants of phishing

A

Spear Phishing, Whaling, Vishing, Smishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Spear Phishing?

A

Phishing that targets certain employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Whaling?

A

Phishing that targets high-level employees or senior management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing?

A

Phishing that targets cell phones, telephones, and VoIP systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Smishing

A

Phishing that uses SMS texting as the vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a Visher do?

A

Vishing Attacks, like make a call spoofing the collection agency or claiming to be a lawyer trying to get personal information or personal health information or intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some of the key indicators to identify phishing in email?

A

Vague salutations - dear valued customer or dear employee
Suspicious looking domain names or display names - potentially misspelled
URL Paths or Hypertext with different actual link/IP address
Awkward Grammar
Urgent or intimidating subject line
Lack of contact info
Spoofed headers/logos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a phishing attack?

A

A cyber attack that uses disguised email as a vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the goal of a phishing attack?

A

To trick the recipient into believing that the message is legitimate so they will click a link or download an attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does BEC stand for?

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Business Email Compromise?

A

BEC is a form of attack that targets companies who outsource, conduct wire transfers, and have suppliers abroad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the common BEC schemes

A

phony invoices and transfers
c-suite fraud
email or webmail account compromise
attorney impersonation or hoaxing
data theft of personally identifiable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming?

A

-blending of the words ‘phishing’ and ‘farming’ that describes a type of cybercrime like phishing
-happens when a website’s traffic is manipulated or spoofed, and confidential information is stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can a pharming attack happen?

A

-attackers may install a virus or trojan on a target that changes the computer’s hosts file to direct traffic away from its intended target and toward a fake web site
-crackers may also poison a DNS server to re-direct multiple users to unintentionally go to the fake site, which in turn can be used to install malware on the victim’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is spam?

A

a slang term for unsolicited commercial email or junk email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the common types of email spam?

A

-advertisements
-chain letters
-spoofed emails relating to phishing campaigns
-hoaxes and money scams (ex. Nigernan prince)
-malware warnings
-unwanted porn email

17
Q

What is a Negative SEO?

A

A “Negative SEO” search engine optimization attack is a form of spam that can actually hurt your business. It could be a competitor making Google think that you’re up to no good.

18
Q

Name the common categories of spam

A

-email spam
-comment spam
-trackback spam
-negative SEO attacks
-spiders and Distriubuted Denial of Service(DDoS) (bots)

19
Q

What is SPIM?

A

-spam overt instant messaging
-unsolicited instant messages

20
Q

Why is Spim harmful?

A

-disrupts chatting
-can contain viruses or spyware

21
Q

How can you prevent spim?

A

-blocking any messages from sources not on your contact list
-most anti-virus programs include spam and spim protection features

22
Q

What is typosquatting?

A

-aka URL hijacking, sting sites, or fake URL
-involves sitting on sites under someone else’s brand or copywrite and targeting internet users who erroneously type a web site address into their browser address bar
-ex: facebool, gooogle, amason

23
Q

What is tailgating/piggybacking?

A

When a physical access token meant for one person is used for two people, whether or not the person scanning knows

-access tokens/badges in this scenario are being used in a single-factor or multi-factor authentication scheme for physical access to buildings, rooms, or certain high security areas like data centers
-considered a violation of a security policy (AUP) combined with some enforcement policy if users do not comply

24
Q

What is dumpster diving?

A

an attack where the goal is to reclaim important information by searching though trash containers and dumpsters

25
What information can attackers get through dumpster diving?
-credit card info -invoices/receipts -IP addressing -org charts -names of key employees -manuals and charts -memos and sticky notes
26
How can you prevent dumpster diving>
-fenced in -locked -good lighting -monitoring, like cameras
27
What is shoulder surfing?
attack where the goal is to look over the shoulder of someone as they enter a password or a PIN
28
What makes shoulder surfing easier?
-camera-equipped mobile devices -binoculars & telescopes let people see screens and keyboards from nearby buildings
29
What is a watering hole attack?
attack that leverages a compromised web server in order to target groups or associations in social networks only members of the association are attacked, while other traffic is untouched
30
Why are watering holes difficult to identify?
even with traffic analysis, most traffic from the infected site is benign / unaffected
31
What are typical goals of scams or attacks?
theft of financials, intellectual property, personal identifiable information, or personal health information
32
What's the first step of most scams?
Remote IP spoofing
33
What's the second step of most scams?
phones, email, sms, im
34
What's the third step of most scams?
masquerading as a legitimate entity
35
Name different forms of scams/fraud
-eliciting info and reconnaissance -hoaxes (pretending to be someone ) -identity fraud (fake documents) -impersonation and pretending (access to financial info) -invoice scams -credential harvesting (gathering usernames and passwords)
36
What can you do if you see someone looking suspicious?
Politely ask for identification or authorization (like a guest badge) if your company policy does not restrict confrontation , or contact security
37
What is an influence campaign?
AKA misinformation operation / influence operation collect tactical info about adversary, locate key influences or stakeholders, launch propaganda/disinformation initiative, gain competitive advantage or confuse adversary
38