Skip to main content

Social Engineering Phishing Attack & Techniques

 

Social Engineering


Social engineering is the art of manipulating and utilizing human behavior to conduct a security breach. In social engineering, the victim, who is being used as a subject for a security breach, does not realize that he or she is being used. Users are considered to be the weakest link in the security chain and are easy to exploit. The attacker can use various methods in social engineering to gain sensitive and confidential information. The attacker can use methods such as sending an E-mail or redirecting the user to a malicious web page. Several methods can be used, but each method intends to get sensitive and confidential information for a security breach.

In social engineering, the attacker psychologically manipulates the victim and misdirects to obtain the desired information.


Social engineering can be performed in various ways:

  • Over the telephone
  • In-person
  • Performing a task on a system

Social engineering can be considered the base of almost all types of passive information-gathering techniques. The outcomes of social engineering can be devastating. With one user as a target in an organization, the attacker can perform a security breach of the entire network. It is just a matter of getting inside the network using the information provided by the user.

There can be various types of users who can be the target of social engineering. Some of the common targets are:

  • Receptionist
  • IT Helpdesk
  • HR department
  • Top management

  Phishing




Phishing is a type of attack that uses social engineering as its base. It uses technical deception to convince a user to provide personal information, such as passwords, social security numbers, credit card numbers, bank account details, and so on. In the phishing attack, the attacker creates a replica Website or web page that tricks the user into providing personal information. The Website or Webpages are real look-alikes of the original Website or Webpages that the user can get tricked. The URLs are close to the original, which users don’t bother to check most of the time. One of the key intents of using phishing is for financial advantage.

Phishing can also be used for getting personal and confidential information from the target. The attacker may simply use an identity, which is legitimate. The attacker does not reveal his or her own identity. Using the legitimate identity of someone else, the attacker requests information from the target. The target may simply be convinced of the legitimate identity and provide the necessary information to the attack, which can then use this information for harmful activities. Generally, phishing takes place using Email. An attacker would pose as an authorized entity and demand information in reply to that mail.

Phishing can be conducted through various methods:

  • In-person
  • Through a malicious Website
  • Through E-mail malware attachments

Phishing and its Types

There are different types of phishing. Some of the common ones are:

Smishing

Smishing is a type of vishing and is a social engineering attack that uses text messaging to obtain sensitive information such as account details.
Vishing
Vishing attack is another form of phishing and is conducted over Voice over IP (VoIP) lines where the attacker pretends to be a legitimate caller from a bank or financial institution. Using the vishing attack, the caller attempts to obtain personal information, such as a bank account number or credit card information.
Watering Hole

A Watering Hole is a more complex type of phishing attack. In this type of attack, an attacker infects a website that is often visited by the target users. The website is infected with malware that is injected into the user’s system when they connect to the website. It is a multi-phased attack in which the attacker first profiles the target, who are employees of an organization or a government agency. In the profiling stage, the attacker learns about the website these employees frequently visit. Then, the website is infected with malware. When the users visit the website, their systems are infected.

The majority of the phishing attacks are performed using E-mails, and mostly in the form of SPAM. Phishers create a database of millions of E-mail accounts, usually from social networking Websites, and then send E-mails to these accounts. Over the years, SPAM E-mails have been well-written and well-designed, making them more convincing. Of late, along with messaging, SPAM SMS has picked up its pace on mobile phones.

Whaling

Whaling is another form of phishing and spear phishing. However, in whaling, the target is highly focused. Whale phishing is meant to target high-profile candidates, such as the CEO or CIO of an organization, or maybe a well-known and established person, such as a film star. High-profile people have high-profile secrets to keep - personal or business-related, which can be used against them. Remember, phishing is just another form of social engineering, and your convincing power plays a major role. The attacker may create a sense of urgency in an E-mail and force a person to click a URL embedded in the E-mail.

Let’s take an example - using whale phishing. You could get your hands on an executive’s official E-mail and official bank account credentials. You cannot only approve monetary transactions but also perform them.

To prevent whale phishing, you need to ensure that you build enough technical and detection controls. Not only in the office, but they also need to be secure at home and when they are using mobile phones.

Pharming

In this type of phishing attack, the user is redirected to a real look-alike Website. When a user types the correct URL in the Web browser, the user is redirected to a real look-alike Website. The user has simply clicked on the URL, which is not incorrect or wrong, but the attack has still occurred. This is done by DNS cache poisoning. The real IP address mapped to the legitimate URL is changed to an IP address to redirect the user to a malicious Website, which is a real look-alike. The user will not be able to suspect anything here because the URL is correct.

Spear Phishing

Spear phishing, unlike general phishing, targets specific individuals and companies. This entity could be an individual or several individuals. An attacker may target a top executive of an organization to steal information, and spear phishing may be used to install malware onto his or her system and eventually get into the network. The spear-phishing Emails are usually designed to look like they originate from a well-known company or a Website. For example, as a firm's top executive, you may receive an email from eBay asking you to reset your account password. The E-mail includes a URL to click and states that there have been unauthorized login attempts, and thus, you should reset your password. Otherwise, your account will be locked. In this example, the E-mail was designed to create a sense of urgency.

Prepending is another type of spear phishing attack. It is a type of Spear phishing attack using machine learning focused on social media accounts like Twitter. Prepending is an automated method to conduct the spear phishing attack. It goes through the user’s posts and makes a note of the most commonly used words. Then, it prepends the tweets from the user. There are links in the tweets that are added based on the user’s engagement with the tweets.

Phishing Methods

Three key methods can be used in phishing:

  • Mass mailing: A large number of audiences are targeted. It is quite likely that some of the audiences are going to fall for this method. This method is usually performed using SPAM.
  • Instant messaging: In the last few years, instant messaging has been one of the key media in phishing. Malicious URLs are sent with attractive messages to lure users into clicking them
  • Malicious Websites: Phishing can also be initiated through malicious Websites.

Phishing Process

Phishing is a four-stage process. These stages are as follows:

  • Initiation - The attacker prepares for an attack.
  • Execution - The attacker sends out mass mail or instant messages to hundreds or thousands of users.
  • User Action - The user performs two tasks - first, clicks on the URL and then enters the personal information on the web page that is loaded.
  • Completion - The information that is entered by the user is received by the attacker and saved at his end. It is now up to the attacker to use this information.

By the end of the fourth stage, the phishing attack is completed. In a phishing attack, the attacker can use various attack methods. Some of these attack methods are:

  • Man-In-The-Middle
  • Session hijacking
  • Phishing through search engines
  • Link Manipulation
  • URL Obfuscation Attacks
  • Client-side vulnerabilities
  • Cross-site scripting
  • Malware / Keyloggers / Screen loggers / Trojans
  • E-mails (Deceptive Phishing)
  • Hosts file poisoning
  • DNS-based Phishing
  • Content-Injection

Reasons for Successful Phishing Attacks

There are various reasons for a phishing attack to become successful. Some of the common reasons are as follows:

Lack of knowledge: Users are not trained enough or are completely unaware of the dangers of phishing attacks. Attackers use this method on several hundred and thousands of users at once, and several users fall prey to the attack.

Visual deception: Attackers very smartly use a similar URL or domain name with a replica of the Website. Users are deceived by the website's replica and without realizing enter their user credentials, which are then captured by the attacker and used on the real Website.

Visual Indicators: Users mostly do not pay attention to the URL or the domain name and, therefore, end up being victims of the phishing attack.

Comments

  1. Protect against social engineering attacks with Cyber Hawks' assessments. Identify vulnerabilities in human factors, improve security awareness, and enhance your organization's resilience against social engineering threats.

    Social Engineering Assessments Services

    ReplyDelete

Post a Comment

Popular posts from this blog

Information Technology Management Part I

The information Technology Revelution While the steam engine and mechanization Created an Industraial Revelution over 150 years ago. 1,Innovation One- The Substituation of mechines for humans skill and effort. 2,The Subsituation of inanimate For animal Sources of power - The steam engine Creating and unlimited source of energy 3,The substituation of new raw materials,espcially minerals,for veggetable and animal substances. The importance of innovation in the Industrial Revolution. In the Technology Revolution we have seen the rapid adoption of many innovations including mainframe computers, laptops, networks, the Internet, assembly language, fourth generation languages, spreadsheet programs and other advanced software programs.In the Technology Revolution, companies use IT as a new source of energy for processing and accessing information.This technology helps the organization collect, store, retrieve, and apply knowledge to solve problems; IT converts the raw materia...

St. Paul இடைத்தேர்தலில் Don Stewart வெற்றி 30 வருட Liberals கோட்டை தகர்ப்பு

    கனடா மக்கள் அதிகம் எதிர்பார்த்த விடயங்களில் இந்த இடைத்தேர்தல் மிக முக்கியமானதாக அமைந்திருந்தது. கடந்த 30 வருடங்களாக liberal கட்சியின் பலம் பொருந்திய கோட்டையாக St. Paul இருந்துவந்தது. கனடா முழுவதும் தற்போதைய அரசாங்கத்துக்கு எதிரான அதிருப்தி நிலை இருந்துவரும் நிலையில் குறிப்பாக liberals ன் ஆதிக்கம் நிறைந்த பகுதியில் மக்களின் மனநிலை எவ்வாறு உள்ளது என்பதை இந்த தேர்தல் முடிவுகள் காட்டிநிற்கும் என எதிர்பார்க்கப்பட்டது அது போலவே மக்கள் மாற்றத்தை விரும்பி Conservative கட்சியை தெரிவு செய்துள்ளனர். இந்த முடிவானது எதிர்வரும் நாடாளுமன்ற தேர்தலின் முடிவுகளை எதிரொலிப்பதாக உள்ளது. கடந்த பதிவில் தேர்தல் கருத்துக்கணிப்புக்கள் கனடா மாற்றத்தை விரும்புகிறது எனபதை குறிப்பிட்டிருந்தேன்."ஒரு பானை சோற்றுக்கு ஒரு சோறு பதம்" என்பது போல் liberal கட்சியானது அடுத்த நாடாளுமன்ற தேர்தலில் குறிப்பாக Ontario மாகாணத்தில் Toronto போன்ற பகுதிகளில் மிகப்பெரும் தோல்விகளை சந்திக்கும் என எதிர்பார்க்கப்படுகின்றது.  லிபரல் கட்சியின் சார்பில் போட்டியிட்ட Leslie church ஐ காட்டிலும் 590 வாக்குகள் அதிகம் பெற்று co...

UK Civil WAR பற்றி எரியும் பிரிட்டன்!!!

  பிருத்தானியாவில் ஓர் நடன பாடசாலை வளகத்திலே 3 சிறுமிகள் கத்திக்குத்துக்கு இலக்காகி படுகொலைசெய்யப்பட்டதை தொடர்ந்து சந்தேக நபர் தொடர்பான அடையாளங்கள் தவறான முறையில் பகிரப்பட்டது.குறித்த கொலையாளி 17வயதுடையவன் அவன் இஸ்லாமியன் என தீவிர வலதுசாரிகளால் பரப்புரை செய்யப்பட்டது. இதனை தொடர்ந்து பிரிட்டனில் பல பாகங்களில் வெறுப்பு போராட்டங்கள் வெடித்தன தொடர்ந்து கடைகள்,வீடுகள்,கார்கள் என்பன போராட்டக்காரர்களால் அழித்து சேதமாக்கப்பட்டது. இதுவரை 400 ற்கு மேற்பட்டவர்கள் நாடுமுழுவதிலிருந்தும் கைது செய்யப்பட்டுள்ளனர். இஸ்லாமியர்கள் அதிகம் வாழும் பகுதிகளை குறிவைத்து தாக்குதல்கள்நடத்தப்பட்டுக்கொண்டிருக்கின்றன.பிருத்தானியாவின் குடிவரவுக்கு எதிர்ப்பை தெரிவிக்கும் வகையிலும் இந்த வன்முறைச்சம்பவங்கள் இடம்பெற்றுள்ளன. சாலைகளில் தீவிர வலதுசாரிகள் கடைகள்,வணிகநிறுவனங்களை தாக்கி கொள்ளையிடுவதையும்,போலீசாரை பட்டாசுகள் வைத்து தாக்குவதும்,”Islam Out” போன்ற வாசங்களை உச்சரித்தபடியும் வன்முறையில் ஈடுபடுகின்றனர். அவர்கள் முன்னிற்கும் கோட்பாடாக “இங்கிலாந்து ஆங்கிலேயருக்கே” என்பதாகும்.மேலும் வன்முறைகள் மூளாமல் இருக்க பிரதமர...