Social Engineering #
Human side of cybersecurity
Social Engineering #
- And phising often preceed password attacks.
- Using the “Human Threat vector”
- Goal: Influence target(s) to take actions that they else would not
- Key Principiples to sucess:
- Authority - Give the impression that you have authority, most people obey to someone that seems in charge or knowledgable, regardless if they are or not.
- Intimidation - Scare or threaten the target so they feel threatened and they take the action that the attacker wants them to do.
- Consensus - (aka Social Proof) people tend to do what other (many people already did), “everyone in here did this except for you”
- Scarcity - Make something look more desirable to the target
- Familiarity - Making the target like the attacker or the organization that the attacker claims to represent
- Trust - Similar to familiarity, here the attacker builds a connection with their target to them make them do things.
- Urgence - Sense or urgency to take the chance away for the target to evaluate the situation
- Often a combination of principles are used.
- Understand the target, how humans react, how stress reactions can be leveraged to meet a goal.
Social Engineering Techniques #
Phising #
Fraudelent acquisition of information
- Spear phising - targetting a specific individual/group
- Whaling - aimed at senior people (CEO, CTO, …)
- Defenses: Awareness training
Vishing #
- Vishing - Phising via phone call
- Often based on urgency/trust and authority
Smishing #
Phising via SMS/IM
- Often based on urgency/trust and authority
- Often trick someone to click on a link to enter credentials or senstive information
Misinformation & Disinformation #
Online influencer campaigns
- Social media, email, online mediums
- Types (MDM)
*** Misinformation - Not True, without malicious intent
- I believe it’s true, but its wrong *** Disinformation - Not True, with malicious intent *** Malinformation - based on reaility, but consciously removed context and using exaggeration with malicious intent
- CISA recommends “TRUST” process to counter mis/disinformation
*** Tell your story
*** Ready your team
*** Understand and assess MDM.
*** Strategize response.
*** Track outocomes.
- Defense: asses info environment, identify vulnerabilities, proactive communication, develop incident response plan.
Impersonation #
Attack pretends to be someone else
- Might use identity guard
Business Email Compromises (BEV) #
Business Email Compromises (BEV)
- AKA Email Account Compromise (EAC)
- Defeneses: Awareness and MFA
- Methods
- Using compromised accounts
- Sending spoofed emails
- Using common fake but similar domain techniques
- Using malware or other tools
Pretexting #
Using a made up scenario on why the attacker approaches the target
- Often to make impersonation more believable
- Defeneses: Be critical, and do a verification call
Watering Hole Attacks #
Use websites that the target frequently uses
- Attackers can set an attack, knowing the target will visit the site. By compromising the site or deploying malway through advertising networks
Brand Impersonation/spoofing #
Also a phising attack
- Send email as if it comes from the brand
- Often intended to have the target log in to a link
Typosquatting #
Have a copy/compromised site with a common typo im url
- Pharming - Changing the host file of a person to do similar attack