Lesson 4 & 5 Flashcards
(80 cards)
Pretexting
(form of impersonation) Using a scenario with convincing
additional detail The classic impersonation attack is for the social engineer to phone into a department,
claim they have to adjust something on the user’s system remotely, and get the user to
reveal their password. This specific attack is also referred to as pretexting.
Tailgating
- Access premises covertly
* Follow someone else through a door
• Piggy backing
- Access premises without authorization, but with the knowledge of an employee
- Get someone to hold a door open
• Identity fraud
- Impersonation with convincing detail and stolen or spoofed proofs
- Identity fraud versus identity theft
• Invoice scams
• Spoofing supplier details to submit invoices with false account details
• Credential theft and misuse
Credential harvesting
• Shoulder surfing
• Lunchtime attack
PHishing, whaling, vishing, spear fishing, sMishing
you know this
Spam
- Unsolicited email
- Email address harvesting
- Spam over Internet messaging (SPIM) (instant messagin service
Hoaxes
- Delivered as spam or malvertising
- Fake advertisement to get user to install remote desktop software
- Phone-based scams
Hoaxes, such as security alerts or chain emails, are another common social
engineering technique, often combined with phishing attacks. An email alert or web
pop-up will claim to have identified some sort of security problem, such as virus
infection, and offer a tool to fix the problem.
Prepending
adding text that appears to have been generated by the mail
system.
- Tagging email subject line
- Can be used by threat actor as a consensus or urgency technique
- Can be added by mail systems to warn users
Pharming
(passive technique)
• Redirection by DNS spoofing
Pharming is a passive means of redirecting users from a legitimate website to a
malicious one. Rather than using social engineering techniques to trick the user,
pharming relies on corrupting the way the victim’s computer performs Internet name
resolution, so that they are redirected from the genuine site to the malicious one. For
example, if mybank.foo should point to the IP address 2.2.2.2, a pharming attack would
corrupt the name resolution process to make it point to IP address 6.6.6.6.
Typosquatting
Www.comptia.org ==> www.connptia.org
Use cousin domains instead of redirection
• Make phishing messages more convincing
• Watering hole
- Target a third-party site
* Customer, supplier, hobbies, social media…
• Credential harvesting
• Attacks focused on obtaining credentials for sale rather than direct
intrusion
• Attacks focused on obtaining multiple credentials for single
company
Influence Campaigns
Sophisticated threat actors using multiple resources to change opinions on a mass scale - Soft power - Hybrid Warfare -social Media
• Soft power
• Leveraging diplomatic and cultural assets
• Hybrid warfare
• Use of espionage, disinformation, and hacking
• Social media (influence campaign)
- Use of hacked accounts and bot accounts
* Spread rumor and reinforce messaging
• Viruses and worms
• Spread within code without authorization
Trojans
• A malicious program concealed within a benign one
• Potentially unwanted programs/applications (PUPs/PAPs)
•Nonecessarily regarded as malicious
Pre-installed “bloatware” or installed alongside another app
• Not completely concealed, but installation may be covert
• Also called grayware
Computer Viruses
• Rely on some sort of host file or media • Non-resident/file infector • Memory resident • Boot • Script/macro • Multipartite • Polymorphic • Vector for delivery
Multipartite
virus uses multiple vectors
Polymorphic
(virus) able to obfuscate code to avoid detection