Social Engineering Flashcards

(63 cards)

1
Q

The art of manipulating people into divulging confidential information or performing actions that compromise security.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institutions to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A fake email from “your bank” asking you to reset your password via a malicious link.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A technique that manipulated victims into divulging information. A pretext is a made-up scenario developed by threat actors for the purpose of stealing a victim’s personal data.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A scammer posing as IT support asks for your login details to “fix an issue”.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A type of phishing attack that also leverages personal communication to gain access to a user’s device or personal information.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Baiting scams can be in the form of tempting ads or online promotions, such as free game or movie downloads, music streaming or phone upgrades.

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A cyberattack that originate offline. In this attack, a thief persuades a courier to pick up or drop off a package in the wrong location, deliver an incorrect package or deliver a package to the wrong recipient.

A

Diversion Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This attack type often involves spoofing, which is a technique used by cybercriminals to disguise themselves as a known or trusted source.

A

Diversion Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A social engineering tactic where the attacker poses as a trustworthy executive who is authorized to deal with financial matters within the organization.

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A scammer spoofs an executive’s email to impersonate them and fraudulently instruct subordinated to transfer funds or change banking details.

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A social engineering attack conducted specifically through SMS messages. In this attack, scammers attempt to lure the user into clicking on a link which directs them to a malicious site. Once on the site, the victim is then prompted to download malicious software and content.

A

Smishing/SMS-Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A scammer spoofs an executive’s email to impersonate them and fraudulently instruct subordinates to transfer funds or change banking details.

A

Smishing/SMS-Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This attack involves the attacker requesting sensitive information from the victim in exchange for a desirable service.

A

Quid Pro Quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

For example, an attacker may pose as an IT support technician, call a user to address a common issue like slow network speeds, and trick them into sharing login credentials, which are then used to access sensitive data or sold on the dark web.

A

Quid Pro Quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A social engineering technique that specifically targets individuals looking for love on online dating websites or social media. The criminal befriends the victim by creating a fictional persona and setting up a fake online profile.

A

Honeytrap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

also known as piggybacking, is a physical breach whereby an attacker gains access to a physical facility by asking the person entering ahead of them to hold the door or grant them access.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

can also include allowing an unauthorized person to borrow an employee’s laptop or other device so that the user can install malware.

A

Tailgating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A Psychological Principles behind the social environment

No social engineering attacks would be possible if the attackers were not able to first build trust with their targets.

A

1 Programming the Trust Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A Psychological Principles behind the social environment

People tend to assign immediate trust to authoritative figures and not doubt their intention. Social engineers will impersonate company executives, lawyers or technicians. The attackers have already investigated which authoritative figures are suitable for each of their victims.

A

2 Persons or Organizations with Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A Psychological Principles behind the social environment

People are more willing to do something or trust a situation or interpersonal dynamic when they observe other people doing it first. They also put a lot of weight into other people’s endorsements.

A

3 Social Proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Psychological Principles behind the social environment

People associate consistent behaviours with people that are reliable, intelligent, trustworthy, and other highly praised traits. Due to this social norm, people tend to care a lot about appearing consistent.

A

4 Consistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A Psychological Principles behind the social environment

When people are similar to us, we tend to perceive them as belonging to “our tribe”. Psychological studies have shown that when people appear to be or think like we do, we automatically assign some other psychological characteristics to them.

A

5 Liking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A Psychological Principles behind the social environment Items that are limited or scarce, are frequently perceived as more valuable and more attractive. This creates desire. But it also creates a sense of urgency. Combined, they make people more than willing to take more than a few shortcuts on the critical thinking processes.
A Psychological Principles behind the social environment #6 Scarcity
26
A Psychological Principles behind the social environment Time pressure is a motivating factor connected to the one of scarcity, not in terms of making an actions desirable, but in terms of giving someone a very short amount of time to fulfill a request. The time pressure is often big enough to make one skip essential critical thinking and analytical processes while acting on a request.
#7 Urgency/Time Pressure
27
A Psychological Principles behind the social environment Attackers keep using old and tried cover stories that have proven to be consistently successful, because these stories involve the exploitation of the psychological principles mentioned. One common attack scenario is the vishing (phone-based) attack, where the attackers call employees and pretend to be IT support staffers, Then they proceed to explain their cover story. For example, they may say that they are running some critical system upgrades and that they need an employee’s username and password in order to proceed.
#8 Incorporating Psychological Pressure into Attack Scenarios
28
is defined as intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question.
Open-Source Intelligence (OSINT)
29
It can be found from various sources such as: o Public Records o Images/Videos o Websites o Social Media Platform o News Media o Libraries
Open-Source Intelligence (OSINT)
30
Who uses OSINT?
o Government o Investigate Journalist o Law Firms o Private Investigators o Social Engineers o Military
31
5 Stages of the Intelligence Cycle
Preparation Collection Processing Analysis and Production Dissemination
32
A stage of the Intelligence Needs and requirements of the requests are assessed, such as determining the objectives of the tasking and identifying the best sources to use to find the information for which you are looking.
Preparation
33
A stage of the Intelligence The primary and most important step in collecting data and information from as many relevant sources as possible.
Collection
34
A stage of the Intelligence The collected data and information are organized or collated.
Processing
35
A stage of the Intelligence The interpretation of the collected information to make sense of what was collected, i.e. identifying patterns or a timeline of travel history. Produce a report to answer the intelligence question, draw, conclusions, and recommend next steps.
Analysis and Production
36
A stage of the Intelligence The presentation and delivery of open-source findings, i.e. written reports, timelines, recommendations, etc. Answer the interquestion for stakeholders.
Dissemination
37
No communication or engagement with individuals online, which includes commenting, messaging, friending, and/or following.
Passive OSINT
38
open-source research is considered engagement and can be looked upon as an undercover operations for some organizations.
Active OSINT
39
Common OSINT Techniques
1. Search Engines 2. Social Media 3. Public Records 4. News Sources 5. Web Scraping 6. Data Analysis Tools
40
is a social engineering tactic where attackers pretend to be someone else — such as a trusted individual, organization, or authority figure — to gain the victim’s trust and manipulate them into revealing sensitive information, performing actions, or providing access to systems.
Impersonation
41
How impersation are used?
- stealing credentials - financial frauds - spreading malware - gaining unauthorized access - manipulating victims - identity theft
42
Common Phishing Kits Technique
1. Email Spoofing 2. Caller ID Spoofing 3. Social Media Impersonation 4. Executive Impersonation (CEO Fraud) 5. Vendor or Supplier Impersonation 6. Authority Impersonation 7. IT Support Impersonation
43
is one of the most common cyber threats to organizations, and phishing kits are a significant reason for this.
Phishing
44
is a set of tools that enables attackers to create convincing fake websites or emails that trick users into divulging sensitive information.
phishing kit
45
What are the types of phishing kits?
- basic phishing kits - spear phishing kits - clone phishing kits - mobile phishing kits - credential harvesting kits - malware integrated phishing kits - evasion kits - multi-platforms phishing kits - open-source phishing kits
46
A type of Phishing Kits Simple kits designed for beginners, often including pre-made templates and scripts.
Basic Phishing Kits
47
A type of Phishing Kits More sophisticated kits with additional features like evasion techniques and automation.
Advanced Phishing Kits
48
A type of Phishing Kits Tailored for targeted attacks specific individuals or organizations.
Spear Phishing Kits
49
A type of Phishing Kits Kits that replicate legitimate emails or websites to trick users.
Clone Phishing Kits
50
A type of Phishing Kits Designed to target mobile users through SMS (smishing) or fake mobile apps
Mobile Phishing Kits
51
A type of Phishing Kits Focused on stealing login credentials through fake forms or pages.
Credential Harvesting Kits
52
A type of Phishing Kits Kits that combine phishing with malware delivery.
Malware-Integrated Phishing Kits
53
A type of Phishing Kits Designed to bypass security measures like firewalls, email or antivirus software.
Evasion Kits
54
A type of Phishing Kits Kits that target multiple platforms (e.g., email, Social media, SMS)
Multi-Platform Phishing Kits
55
A type of Phishing Kits Free dark or low-cost kits available on platforms like GitHub or web forums.
Open-SOurce Phishing Kits
56
COMMON PHISHING KITS TECHNIQUES
1.Email Spoofing 2.Website Cloning 3.Link Manipulation 4. Attachment-Based Phishing 5.Spear Phishing 6. Smishing (SMS Phishing) 7. Vishing (Voice Phishing) 8. Prestexting 9. Quid Pro Quo 5.Spear Phishing 10. Social Media Phishing 11. Pop-Up Phishing 12. Watering Hole Attacks 13. Business Email Compromise (BEC) 14. Credential Harvesting 15. Evasion Techniques
57
is the process of distributing malicious software (malware) to a victim’s device or network.
Malware delivery
58
it often relies on social engineering tactics to trick users into downloading or executing the malicious payload.
Malware delivery
59
COMMON MALWARE DELIVERY TECHNIQUES
1.Phishing Emails 2.Malicious Websites 3.Social Media and Messaging Apps 4.USB Drives and Removable Media 5.Software Bunding 6.Remote Desktop Protocol (RDP) Exploits 7. Malvertising 8. File Sharing and P2P Networks 9. Impersonation and Trust Exploitation 10. Watering Hole Attacks 11. Supply Chain Attacks 12. Exploiting Vulnerabilities
60
Conduct regular awareness programs to educate employees and individuals about social engineering tactics, red flags, and best practices
Education & Training
61
requires users to provide two or more forms of verification (e.g., password + SMS code or biometric scan) to access accounts or systems
Multi-Factor AUthentication
62
Establish clear guidelines for handling sensitive information, such as verifying requests for data or payments and reporting suspicious activity.
Policies and Procedures
63
A predefined set of steps to follow if a social engineering attack is suspected or detected.
Incident Response Plan