summary Flashcards
(341 cards)
Phishing
• Social engineering with a touch of spoofing
– Often delivered by email, text, etc.
– Very remarkable when well done
• Don’t be fooled
– Check the URL
• Usually there’s something not quite right
– Spelling, fonts, graphics
Tricks and misdirection
• How are they so successful?
– Digital slight of hand - it fools the best of us
• Typosquatting
– A type of URL hijacking - https://professormessor.com
– Prepending: https://pprofessormesser.com
• Pretexting
– Lying to get information
– Attacker is a character in a situation they create
– Hi, we’re calling from Visa regarding an automated
payment to your utility service…
Pharming
• Redirect a legit website to a bogus site
– Poisoned DNS server or client vulnerabilities
• Combine pharming with phishing
– Pharming - Harvest large groups of people
– Phishing - Collect access credentials
• Difficult for anti-malware software to stop
– Everything appears legitimate to the user
Phishing with different bait
• Vishing (Voice phishing) is done over the phone or voicemail – Caller ID spoofing is common – Fake security checks or bank updates Smishing (SMS phishing) is done by text message – Spoofing is a problem here as well – Forwards links or asks for personal information • Variations on a theme – The fake check scam, phone verification code scam, – Boss/CEO scam, advance-fee scam – Some great summaries on https://reddit.com/r/Scams
Finding the best spot to phish
• Reconnaissance – Gather information on the victim • Background information – Lead generation sites – LinkedIn, Twitter, Facebook, Instagram – Corporate web site • Attacker builds a believable pretext – Where you work – Where you bank – Recent financial transactions – Family and friends
Spear phishing
• Targeted phishing with inside information
– Makes the attack more believable
• Spear phishing the CEO is “whaling”
– Targeted phishing with the possibility of a large catch
– The CFO (Chief Financial Officer) is commonly speared
• These executives have direct access to
the corporate bank account
– The attackers would love to have those credentials
1.1 - Impersonation The pretext
• Before the attack, the trap is set
– There’s an actor and a story
• “Hello sir, my name is Wendy and I’m from Microsoft
Windows. This is an urgent check up call for your
computer as we have found several problems with it.”
• Voice mail: “This is an enforcement action executed by
the US Treasury intending your serious attention.”
• “Congratulations on your excellent payment history! You
now qualify for 0% interest rates on all of your credit
card accounts.”
1.1 - Impersonation
• Attackers pretend to be someone they aren’t
– Halloween for the fraudsters
• Use some of those details from reconnaissance
– You can trust me, I’m with your help desk
• Attack the victim as someone higher in rank
– Office of the Vice President for Scamming
• Throw tons of technical details around
– Catastrophic feedback due to the
depolarization of the differential magnetometer
• Be a buddy
– How about those Cubs?
1.1 - Impersonation Eliciting information
• Extracting information from the victim
– The victim doesn’t even realize this is happening
– Hacking the human
• Often seen with vishing (Voice Phishing)
– Can be easier to get this information over the phone
• These are well-documented psychological techniques
– They can’t just ask, “So, what’s your password?”
1.1 - Impersonation Identity fraud
• Your identity can be used by others
– Keep your personal information safe!
• Credit card fraud
– Open an account in your name, or use your credit card information
• Bank fraud
– Attacker gains access to your account or opens a new account
• Loan fraud
– Your information is used for a loan or lease
• Government benefits fraud
– Attacker obtains benefits on your behalf
1.1 - Impersonation Protect against impersonation
• Never volunteer information – My password is 12345 • Don’t disclose personal details – The bad guys are tricky • Always verify before revealing info – Call back, verify through 3rd parties • Verification should be encouraged – Especially if your organization owns valuable information
1.1 - Impersonation Identity fraud
• Your identity can be used by others
– Keep your personal information safe!
• Credit card fraud
– Open an account in your name, or use your credit card information
• Bank fraud
– Attacker gains access to your account or opens a new account
• Loan fraud
– Your information is used for a loan or lease
• Government benefits fraud
– Attacker obtains benefits on your behalf
1.1 - Shoulder Surfing
• You have access to important information – Many people want to see – Curiosity, industrial espionage, competitive advantage • This is surprisingly easy – Airports / Flights – Hallway-facing monitors – Coffee shops • Surf from afar – Binoculars / Telescopes – Easy in the big city – Webcam monitoring
1.1 - Shoulder Surfing • Preventing shoulder surfing
• Control your input – Be aware of your surroundings • Use privacy filters – It’s amazing how well they work • Keep your monitor out of sight – Away from windows and hallways • Don’t sit in front of me on your flight – I can’t help myself
1.1 - Hoaxes Computer hoaxes
• A threat that doesn’t actually exist – But they seem like they COULD be real • Still often consume lots of resources – Forwarded email messages, printed memorandums, wasted time • Often an email – Or Facebook wall post, or tweet, or... • Some hoaxes will take your money – But not through electronic means • A hoax about a virus can waste as much time as a regular virus
De-hoaxing
• It’s the Internet. Believe no one. – Consider the source • Cross reference – http://www.hoax-slayer.net – http://www.snopes.com • Spam filters can help – There are so many other ways... • If it sounds too good to be true... – So many sad stories
1.1 - Watering Hole Attacks
• What if your network was really secure? – You didn’t even plug in that USB key from the parking lot • The attackers can’t get in – Not responding to phishing emails – Not opening any email attachments • Have the mountain come to you – Go where the mountain hangs out – The watering hole – This requires a bit of research
1.1 - Watering Hole Attacks Executing the watering hole attack
• Determine which website the victim group uses
– Educated guess - Local coffee or sandwich shop
– Industry-related sites
• Infect one of these third-party sites
– Site vulnerability
– Email attachments
• Infect all visitors
– But you’re just looking for specific victims
– Now you’re in!
1.1 - Watering Hole Attacks Because that’s where the money is
• January 2017
• Polish Financial Supervision Authority, National Banking
and Stock Commission of Mexico, State-owned
bank in Uruguay
– The watering hole was sufficiently poisoned
• Visiting the site would download malicious JavaScript files
– But only to IP addresses matching banks and
other financial institutions
• Did the attack work?
– We still don’t know
Watching the watering hole
• Defense-in-depth
– Layered defense
– It’s never one thing
• Firewalls and IPS
– Stop the network traffic before things get bad
• Anti-virus / Anti-malware signature updates
– The Polish Financial Supervision Authority attack code
was recognized and stopped by generic signatures in
Symantec’s anti-virus software
1.1 - Spam
• Unsolicited messages – Email, forums, etc. – Spam over Instant Messaging (SPIM) • Various content – Commercial advertising – Non-commercial proselytizing – Phishing attempts • Significant technology issue – Security concerns – Resource utilization – Storage costs – Managing the spam
1.1 - Spam Mail gateways
• Unsolicited email
– Stop it at the gateway before it reaches the user
– On-site or cloud-based
Identifying spam
• Allowed list
– Only receive email from trusted senders
• SMTP standards checking
– Block anything that doesn’t follow RFC standards
• rDNS - Reverse DNS
– Block email where the sender’s domain doesn’t match the IP
address
• Tarpitting
– Intentionally slow down the server conversation
• Recipient filtering
– Block all email not addressed to a valid recipient email address
1.1 - Influence Campaigns Hacking public opinion
• Influence campaigns – Sway public opinion on political and social issues • Nation-state actors – Divide, distract, and persuade • Advertising is an option – Buy a voice for your opinion • Enabled through Social media – Creating, sharing, liking – Amplification