Threats, Attacks, Vulnerabilities Flashcards
Social Engineering with a touch of spoofing
- Often delivered by email, text, etc
- Very remarkable when well done
Usually there’s something that is not quite right
-Spelling, fonts, graphics
How are they so successful?
-Digital slight of hand - it fools the best of us
Sending a false email pretending to be legitimate to steal valuable information from the user
Phishing
A type of URL hijacking
Typosquatting
Lying to get information
Attacker is a character in a situation they create
Hi, we’re calling from Visa regarding an automated payment to your utility service
Pretexting
Redirects a legit website to a bogus site
- Poisoned DNS server or client vulnerabilities
Harvest large groups of people
Difficult for anti-malware software to stop
Pharming
Voice phishing over the phone or voicemail
- Caller ID spoofing is common
- Fake security checks or bank updates
Attack through a phone or voice communications
Vishing
Done by text messages
- Spoofing is a problem here as well
- Forwards links or asks the personal information
Variations on a theme
- Fake check scam, phone verification code scam
- Boss/CEO scam, advance fee scam
Smishing
Gather information on the victim
Reconnaissance
Targeted phishing with inside information
- Makes the attack more believable
Attack that targets specific users
Spear Phishing
Spear Phishing the CEO
Attack on a powerful or wealthy individual
Whaling
Before the attack, the trap is set
- There’s an actor and a story
Attackers pretend to be someone they aren’t
- Halloween for fraudsters
Use some of those details from reconnaissance
Attack the victim as someone higher in rank
Throws tons of technical details around
Impersonation
Extracting information from the victim
- Victim doesn’t even realize this is happening
- Hacking the human
Often seen with vishing
- Can be easier to get this info over the phone
Well documented psychological techniques
Eliciting information
Your identity can be used by others
- Keep your personal information safe
Credit Card Fraud
- Open an account in your name, or use your credit card information
Bank Fraud
-Attacker gains access to your account of opens a new account
Loan Fraud
- Your infromation is used for a loan or lease
Government benefits fraud
- Attacker obtains benefits on your behalf
Identity Fraud
Mobile garage bin
Important information thrown out with trash
Gather details that can be used for a different attack
- Impersonate names, use phone numbers
Timing is important
- Just after end of month, end of quarter
- Based on pickup schedule
If it is in the trash, its open season
- Nobody owns it
Dumpsters on privact property or “No Trespassing” signs may be restricted
- You can’t break the law to get rubbish
Dumpster Diving
You have access to important information
- Many people want to see
- Curiosity, industrial espionage, competitive advantage
This is surprisingly easy
- Airports/Flights
- Hallway-Facing Monitors
- Coffee Shops
Surf from afar
- Binoculars/Telescopes
- Easy in the big city
- Webcam monitoring
To prevent
- Control your input
- Use privacy filters
- Keep your monitor out of sight
- Don’t sit in front of me on your flight
Shoulder Surfing
Threat that does not actually exist
- But seems like it could be real
Still often consume lots of resources
- Forwarded email messages, printed memorandums, wasted time
Often an email
- Or Facebook wall post, tweet, etc
Some will take your money
- But not through electronic means
Can waste as much time as a regular virus
Spam filters can help
If it sounds too good to be true…
Hoaxes
Have the mountain come to you
- This requires a bit of research
Determine which website the victim group uses
- Educated guess - Local coffee or sandwich shop
- Industry related sites
Infect one of these third party sites
- Site vulnerability
- Email attachments
Infect all visitors
- But you’re just looking for specific victims
Defense-in-depth
- Layered defense
- It’s never one things
Firewalls and IPS
- Stop the network traffic before things get bad
Anti-virus/Anti-malware signature updates
Watering Hole Attacks
Unsolicited messages
- Email, forums
- Spam over Instant Messaging (SPIM)
Various content
- Commercial advertising
- Phishing attempts
Significant technology issues
- Security concerns
- Resource utilization
- Storage costs
- Managing the spam
Unsolicitated email
- Stop it on the gateway before reaching user
- On-site or cloud based
Allowed list
- Only receive email from trusted senders
SMTP standards checking
- Block anything that doesn’t follow RFC standards
SPAM
Sway public opinion on political or social issues
Nation-state actors
- Divide, distract, and persuade
Advertising is an option
- Buy a voice for your opinion
Embedded through social media
- Creating, sharing, liking
- Amplification
Influence Campaigns
Military strategy
- A broad description of the techniques
- Wage war non-traditionally
Not a new concept
- The internet adds new methods
Cyberwarfare
- Attack an entity with technology
Influence with a military spin
- Influencing foreign elections
- Fake News
Hybrid Warfare
Use an authorized person to gain unauthorized access to a building
- Not an accident
No tech hacking
- Blend in with clothing
- 3rd-party with a legitimate reason
- Temporarily take up smoking
Once inside, little to stop attacker
- Most security stops at the border
Policy for visitors
- You should be able to identify anyone
One scan, on person
- A matter of policy or mechanically required
Mantrap/Airlock
- You don’t have a choice
Don’t be afraid to ask
- Who are you and why are you here?
Tailgaiting
Starts with a bit of spear phishing
- Attacker knows who pays the bills
Attacker sends a fake invoice
- Domain renewal, toner cartridges
- From: address is spoofed version of CEO
Accounting pays the invoice
- It was from the CEO after all
Might include a link to pay
- Now the attacker has payment details
Invoice Scams
Also called password harvesting
- Attacker collects login credentials
There are alot of stored credentials on your computer
- Chrome, Firefox, Outlook, etc
User received an email with malicious Word doc
- Opening document runs macro
- Macro downloads credential harvesting malware
User has no idea
- Everything happens in background
Credential Harvesting
The social engineer is in charge
- I’m calling from the help desk/office of the CEO/police
Authority - Social Engineering principle
There will be bad things if you don’t help
- If you don’t help me, the payroll checks won’t be processed
Intimidation - Social Engineering principle