CompTIA Security+ Exam Notes

CompTIA Security+ Exam Notes
Let Us Help You Pass
Showing posts with label Social Engineering. Show all posts
Showing posts with label Social Engineering. Show all posts

Sunday, October 27, 2024

Pretexting: Beyond Phishing - Targeted Social Engineering Attacks

 Pretexting

Pretexting is a form of social engineering where attackers create a fabricated story or scenario to trick a victim into divulging sensitive information by building trust through a convincing, personalized narrative, often impersonating someone familiar to the victim, like a coworker or government official, to gain access to confidential data, which is considered illegal for financial institutions under the Gramm-Leach-Bliley Act (GLBA) when used to collect personal financial details.

Deceptive scenario:

Attackers craft a believable, tailored story to manipulate the victim into providing information they wouldn't usually share.

Trust building:

Unlike phishing, which relies on fear and urgency, pretexting aims to establish a false sense of trust with the victim.

Targeted approach:

Pretexting attacks often focus on specific individuals or organizations, gathering background information to craft a convincing narrative.

Impersonation tactics:

Attackers may impersonate colleagues, delivery personnel, or government officials to appear legitimate.

Methods of contact:

Pretexting attacks can happen online (email), over the phone (vishing), or in person.

Example of a pretexting attack:

An attacker emails a company employee pretending to be from the IT department, stating there's a critical security issue and requesting their login credentials to "fix the problem."

How to protect against pretexting:

Employee awareness training:

Educate employees about social engineering tactics and how to identify potential pretexting attempts.

Verification procedures:

Implement strict verification processes for sensitive information requests, especially when the request seems unusual.

Data privacy policies:

Enforce robust data privacy policies to limit access to sensitive information.

Saturday, October 26, 2024

Understanding Vishing: The Voice Phishing Threat

 Vishing

"Vishing" is a term used for "voice phishing," a type of cybercrime in which attackers use phone calls to trick victims into revealing sensitive personal information, like credit card numbers or login details, by pretending to be a legitimate company or authority figure over the phone; essentially, it's phishing conducted through voice calls instead of email.

Method:

Attackers often use caller ID spoofing to make it appear that they are calling from a trusted source, such as a bank or credit card company.

Goal:

To obtain sensitive information from the victim by using deceptive tactics and social engineering.

Example scenario:

A scammer might call, claiming to be from a bank's fraud department, and ask the victim for credit card details to "verify" a suspicious activity.

Thursday, October 10, 2024

Threat Vector

 Threat Vector

A threat vector is a method or path that cybercriminals use to gain access to a network, device, or system. The term is often used interchangeably with "attack vector."

Here are some examples of threat vectors:

  • Phishing emails
  • Malicious websites
  • SQL injection
  • Social engineering
  • Cross-site scripting
  • Denial of service
  • Brute force attacks
  • Malware
  • Exploiting vulnerabilities

Understanding threat vectors is essential for developing effective cybersecurity strategies. Organizations can recognize and track an adversary's attack vectors to better defend against targeted attacks.