Tactics and Techniques Used Flashcards

1
Q

Introduction

A

This section of the Phishing Analysis domain will introduce you to the tactics and techniques used by malicious actors to try and make their emails as effective as possible. There are a lot of techniques that can be used to make emails seem legitimate, increase the chances of targets interacting with malicious elements, bypass security features such as email scanning or make it harder for security teams to take defensive measures and stop malicious emails being delivered to employee mailboxes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Learning Objectives

A

By the end of this section you will have achieved the following objectives:

Understand the techniques utilized by malicious actors to make emails more convincing to recipients such as hyperlinks, attachments, impersonation, typosquatting, and email styling.
Identify the techniques that have been used in real phishing emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear Phishing

A

Spear phishing is when a malicious actor spends time before the phishing attack to gather information about their specific target, to make the email more effective. By tailoring the email to the target, it makes it more convincing. It increases the chances of the recipient clicking on the email and entering their credentials, or opening an attachment. This type of attack requires planning and good use of open-source intelligence (OSINT) sources to gather information. The attacker will look for websites that the target uses, any hobbies or interests they have, and even record family members, colleagues, or friends. All of this information can be used to create highly effective emails that seem legitimate. Let’s cover a few examples.

Other phishing email techniques can be used, such as typosquatting or sender spoofing, to make the email sender appear legitimate, and if the attacker is trying to entice the target to visit a malicious website, the typo squat domain works to mimic the real name of a legitimate site, making it harder to spot at a glance that it’s fake. (We’ll cover both of these techniques in the next few lessons).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Example Walkthrough

A

An attacker wants to send a spear-phishing email to an employee at Dickson United in order to get them to open a malicious attachment, which will create a backdoor and allow the malicious actor to remotely connect to the target’s corporate laptop or desktop.

The attacker finds the employee on LinkedIn and notes down their colleagues. The actor then performs a reverse-image search on the profile picture and finds their Facebook account. From there, they are able to collect information about their interests and friends as they haven’t set up privacy settings properly.

They then craft an email designed specifically for the target using information related to the subject so they are more likely to engage with the email. Spear-phishing emails can also include social engineering tactics such as impersonation to make the email even more believable. This type of phishing attack is very popular with advanced malicious actors, and you’ll see that this technique is responsible for lots of data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly