OB 2.2 SOCIAL ENGINEERING

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/34

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

35 Terms

1
New cards

Social Engineering

range of malicious activities

accomplished through human

interactions.

It involves tricking people into breaking

normal security procedures and best

practices to gain unauthorized access to

systems, networks, or physical locations,

or for financial gain.

2
New cards

Phishing attacks typically have one or more

of the following objectives:

Credential Theft

◦ Financial Fraud

◦ Malware Distribution

◦ Identity Theft

Here are several steps and measures that are

typically taken:

◦ User Education

◦ Email Filtering

◦ Two-Factor Authentication (2FA)

◦ Incident Response

3
New cards

Vishing

phone calls to

impersonate trusted entities or organizations

with the primary goal of manipulating

individuals into disclosing sensitive

information or taking actions that

compromise security.

Voice Communication:

◦ Unlike traditional phishing, vishing relies on

spoken communication through phone calls.

4
New cards

Vishing:

Key Characteristics

Urgent or Coercive Language: Vishing calls

often employ urgency, fear, or intimidation to

manipulate victims into immediate

compliance.

◦ Spoofed Caller IDs: Attackers may manipulate

caller IDs to display legitimate-sounding

numbers or organizations, increasing their

credibility.

◦ Requests for Sensitive Information: Vishing

calls frequently involve requests for personal

identification numbers (PINs), passwords,

credit card details, or other sensitive data

5
New cards

Vishing: Mitigation

Education and Awareness: Train individuals

to be cautious of unsolicited phone calls,

recognize vishing attempts, and refrain from

sharing sensitive information over the

phone.

◦ Verification: Encourage recipients of phone

calls to independently verify the caller's

identity by calling back on a known and

trusted phone number or contact the

organization through official channels.

◦ Use of Authentication: Implement multifactor

authentication (MFA) or PIN-based

authentication for sensitive transactions over

the phone, adding an extra layer of security

6
New cards

Smishing

SMS phishing," is a

cyberattack technique where malicious

actors use text messages to impersonate

trusted entities or organizations with the

primary goal of manipulating individuals into

disclosing sensitive information or taking

actions that compromise security.

7
New cards

Smishing:

Key Characteristics

◦ Deceptive Messages: Smishing messages are

designed to appear as if they are from

legitimate sources, and often contain urgent

or enticing content to elicit a quick response

from the recipient.

◦ Requests for Information: Smishing messages

typically request sensitive information, such

as personal identification numbers (PINs),

passwords, credit card details, or other

confidential data.

◦ Spoofed Sender Information: Attackers can

manipulate the sender information to make

it appear as if the message is coming from a

trusted source, increasing the likelihood that

recipients will fall for the scam.

8
New cards

Smishing: Mitigation

Education and Awareness: Training

individuals to be cautious of unsolicited text

messages, recognize smishing attempts, and

avoid clicking on links or sharing sensitive

information in response to such messages is

a crucial defense.

◦ Verification: Encourage recipients of

suspicious text messages to independently

verify the sender's identity by contacting the

organization or individual through official

channels, such as a known and trusted

phone number or website.

◦ Use of Security Software: Employ mobile

security apps that can detect and block

smishing messages. These apps often include

features like message filtering and link

scanning to protect users from malicious

content.

9
New cards

Spear Phishing

targeted form of phishing where the

attacker customizes their attack emails,

messages, or communications to appeal

to specific victims.

Unlike general phishing attacks, spear

phishing is tailored to particular

individuals, often using personal or

organizational information to appear

more legitimate.

10
New cards

Misinformation

dissemination

of false or inaccurate information, often

unintentionally, without malicious intent.

11
New cards

disinformation

deliberate spreading of false or

misleading information with the intent to

deceive, manipulate, or harm.

12
New cards

Misinformation:

Key Characteristics

Accidental: Misinformation typically occurs

inadvertently and may result from errors,

misunderstandings, or misinformation

campaigns.

◦ Non-Malicious: Individuals or entities

spreading misinformation are usually not

acting with harmful intent.

◦ Unintentional Consequences: While not

deliberate, misinformation can still lead to

security vulnerabilities if false information is

acted upon, potentially causing data breaches

or system compromises.

13
New cards

Disinformation:

Key Characteristics

Deliberate: Disinformation campaigns are

carried out with the intention to deceive or

manipulate, often for political, financial, or

competitive gains.

◦ Malicious Intent: Perpetrators of

disinformation seek to harm, sow discord, or

gain an unfair advantage by spreading false or

misleading information.

◦ Targeted and Coordinated: Disinformation

campaigns are often well-planned, involving

multiple actors and strategies to amplify the

false information's impact.

14
New cards

Misinformation and

Disinformation:

Mitigation

Media Literacy and Education: Promote

media literacy among individuals and

organizations to help them critically evaluate

information sources, identify false

information, and differentiate between

credible and unreliable content.

◦ Fact-Checking and Verification: Encourage

the use of fact-checking tools and services to

verify information before sharing or acting

upon it. This can help prevent the spread of

false information.

◦ Cyber Hygiene and Security Awareness:

Educate users about the potential

cybersecurity risks associated with

misinformation and disinformation, including

the importance of verifying the sources of

information and avoiding clicking on

suspicious links or downloading unverified

files.

15
New cards

Impersonation: Definition

legitimate user to access a system or

network.

This can be done through various means

such as stealing login credentials, using

spoofed email addresses, or mimicking voice

or biometric identifiers.

16
New cards

Impersonation:

Key Characteristics

Use of Stolen Credentials: Often involves the

use of credentials obtained through phishing

attacks, keyloggers, or social engineering.

◦ Deception and Manipulation: Attackers may

use social engineering tactics to trick

individuals into revealing sensitive

information or credentials.

◦ Targets a Range of Systems: Can be aimed at

any platform where user authentication is

required.

◦ Difficult to Detect: Since the attacker appears

as a legitimate user, it can be challenging to

detect such intrusions.

17
New cards

Impersonation:

Mitigation

Strong Authentication Measures:

Implementing multi-factor authentication

(MFA) which requires more than one method

of verification.

◦ Password Changes and Password

Complexity: Change passwords regularly and

use complex, hard-to-guess passwords.

◦ User Education and Awareness Training:

Training users to recognize phishing

attempts and other social engineering

tactics.

◦ Monitoring and Logging: Keeping detailed

logs and monitoring systems for unusual

access patterns or login attempts.

◦ Incident Response Planning: Having a clear

plan for responding to detected

impersonation attempts, including isolating

affected systems and changing

compromised credentials.

18
New cards

Business Email

Compromise: Definition

attacker gains access to a corporate

email account and impersonates the owner

to defraud the company, its employees,

customers, or partners.

Typically, the attacker requests transfers of

funds or sensitive data.

19
New cards

Business Email

Compromise:

Key Characteristics

Targeted Email Spoofing: The attacker often

spoofs or hijacks corporate email accounts to

appear legitimate.

◦ Sophisticated Social Engineering: These

attacks usually involve carefully crafted

phishing emails and advanced social

engineering tactics to manipulate employees.

◦ Financial Motive: BEC attacks are primarily

financially motivated, often leading to

unauthorized fund transfers.

◦ High Level of Customization: Emails are

usually highly customized and targeted, using

information specific to the business or

individual being targeted.

◦ Lack of Malware: Unlike other cyber attacks,

BEC often doesn't involve malware, making it

harder to detect with conventional security

tools.

20
New cards

Business Email

Compromise: Mitigation

Employee Education and Awareness: Regular

training for employees on recognizing

phishing attempts and suspicious email

content.

◦ Email Authentication Protocols:

Implementing email authentication methods

like SPF (Sender Policy Framework), DKIM

(DomainKeys Identified Mail), and DMARC

(Domain-based Message Authentication,

Reporting, and Conformance).

21
New cards

Pretexting: Definition

creating a fabricated story or

scenario (the pretext) to deceive a target

into divulging sensitive information. The

attacker often conducts extensive research

to make the story as convincing as possible.

Pretexting often involves the attacker

pretending to be someone they are not, like

a trusted authority figure, to gain the

victim's trust.

22
New cards

Pretexting:

Key Characteristics

Use of Elaborate False Scenarios: Attackers

create believable stories or pretexts to justify

their requests for information.

◦ Targeting Personal or Sensitive Information:

The information sought often includes

passwords, financial records, or personal

identification data.

◦ Manipulating Trust: Attackers often pose as

trusted individuals or authorities, such as

bank officials, police, or corporate IT staff.

◦ High Level of Customization: The scenarios

are usually tailored to the specific target to

increase their effectiveness

23
New cards

Pretexting

involves more interaction

between the attacker and the victim, with

the attacker playing a role that suits the

pretext.

24
New cards

Impersonation

directly assumes the identity

of another person, often using stolen

credentials or identities. It's less about

building a story and more about leveraging

the existing trust associated with the

assumed identity.

25
New cards

Pretexting: Mitigation

Employee Education and Training: Regular

training sessions for employees to recognize

and respond to pretexting attempts.

◦ Verification Procedures: Implementing strict

procedures for verifying the identity of

individuals requesting sensitive information.

◦ Limiting Information Disclosure: Educating

employees about the dangers of oversharing

information, especially in unsolicited calls or

emails.

◦ Incident Reporting Mechanisms: Establishing

clear protocols for reporting suspected

pretexting incidents.

26
New cards

Watering Hole: Definition

targeted cyber attack strategy where the

attacker seeks to compromise a specific

group of end users by infecting websites

they are known to frequently visit.

The goal is to infect a user's computer and

gain access to the network at the user's

place of employment.

27
New cards

Watering Hole:

Key Characteristics

Targeting Specific User Groups: The attacker

chooses websites that are popular among a

particular group, often related to their work,

interests, or geographical location.

◦ Exploiting Website Vulnerabilities: The

attacker infects these websites with malware,

often by exploiting security weaknesses.

28
New cards

Watering Hole: Mitigation

Regular Website Security Audits: For

organizations, ensuring that their own

websites do not become watering holes

through regular security audits.

◦ Employee Awareness and Training: Educating

employees about the risks of visiting

untrusted websites and the signs of a

potential compromise.

◦ Up-to-date Security Software: Ensuring all

systems and software are up-to-date with

the latest security patches and antivirus

definitions.

◦ Network Segmentation and Monitoring:

Implementing network segmentation to

limit the spread of an attack and continuous

monitoring for unusual network activities.

29
New cards

◦ Drive-by Downloads or Malicious Redirects:

attack is often executed through drive-by

downloads or redirecting users to a

malicious site, which then installs malware

on their device without their knowledge.

30
New cards

Brand Impersonation:

Definition

type of cyber attack where an

attacker mimics or impersonates the brand

identity of a reputable company to deceive

victims, usually for the purpose of stealing

sensitive information or spreading malware.

This can occur via emails, websites, social

media, or other digital platforms.

31
New cards

Brand Impersonation:

Key Characteristics

Use of Counterfeit Brand Elements: Attackers

often use logos, branding styles, and other

visual elements that closely resemble those

of a legitimate brand.

◦ Phishing Emails and Fake Websites: A

common tactic involves sending phishing

emails that appear to be from a trusted

brand or creating fake websites that mimic

real ones.

◦ Exploiting Trust in Established Brands: The

success of these attacks largely depends on

the victim's trust in the impersonated brand.

◦ Targets a Broad Audience: Unlike targeted

phishing attacks, brand impersonation can

target a large and diverse group of

individuals who trust or recognize the brand

32
New cards

Brand Impersonation:

Mitigation

Brand Monitoring: Regularly monitor the

internet for unauthorized uses of the

brand’s identity, including domain

registrations and social media accounts.

◦ Public Awareness and Education: Inform

customers and the public about how to

identify legitimate communications and

websites.

◦ Robust Internal Security Measures:

Implementing strong security protocols

within the organization to prevent data

breaches that could lend credibility to

impersonators.

◦ Incident Response Plan: Having a plan in

place to quickly respond to instances of

brand impersonation, including legal action if

necessary.

33
New cards

Typosquatting: Definition

form of cyber attack where attackers

register domain names that are misspellings

of popular websites or mimic well-known

domain names.

The aim is to deceive internet users who

make typographical errors when entering a

URL into their browser, leading them to a

malicious or deceptive website.

34
New cards

Typosquatting:

Key Characteristics

Similar or Misspelled Domain Names: The

core of typosquatting is the use of domain

names that are slight misspellings or

variations of legitimate domain names (e.g.,

'googgle.com' instead of 'google.com').

◦ Exploiting User Mistakes: The strategy relies

on users making common typing errors or

misremembering exact URLs.

◦ Variety of Malicious Intentions: These sites

may host malware, phishing scams, or may be

used to sell counterfeit goods or steal

personal information.

◦ Fake Websites or Redirects: Typosquatted

domains often host websites that mimic the

design of the intended site or redirect users

to other malicious sites.

35
New cards

Typosquatting: Mitigation

Awareness and Training: Educating

employees and users about the risks of

typosquatting and the importance of

carefully entering URLs.

◦ Use of Bookmarks for Important Sites:

Encouraging the use of bookmarks for

frequently visited and critical websites to

avoid typing URLs.

◦ Advanced Web Browsers and Security Tools:

Utilizing web browsers and security tools

that can detect and alert users about

suspicious websites.

◦ Defensive Domain Registration:

Organizations should consider registering

common misspellings of their own domain

names to prevent typosquatting.