<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybersecurity | 🃏 slides.nauda.dev 🃏</title><link>https://slides.nauda.dev/category/cybersecurity/</link><atom:link href="https://slides.nauda.dev/category/cybersecurity/index.xml" rel="self" type="application/rss+xml"/><description>cybersecurity</description><generator>Wowchemy (https://wowchemy.com)</generator><language>en-us</language><lastBuildDate>Thu, 26 Oct 2023 00:00:00 +0000</lastBuildDate><image><url>https://slides.nauda.dev/media/icon_hube4dce13482f81b54a523f0927f755ce_23287_512x512_fill_lanczos_center_3.png</url><title>cybersecurity</title><link>https://slides.nauda.dev/category/cybersecurity/</link></image><item><title>Social engineering - The art of Human hacking</title><link>https://slides.nauda.dev/slides/social-engineering/</link><pubDate>Thu, 26 Oct 2023 00:00:00 +0000</pubDate><guid>https://slides.nauda.dev/slides/social-engineering/</guid><description>&lt;h1 id="social-engineering---the-art-of-human-hacking">Social engineering - The art of Human hacking&lt;/h1>
&lt;p>Trung Pham Duy - October 2023&lt;/p>
&lt;hr>
&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;ul>
&lt;li>Presenter: Trung Pham Duy&lt;/li>
&lt;li>Email: &lt;a href="mailto:duytrung.tcu@gmail.com">duytrung.tcu@gmail.com&lt;/a>&lt;/li>
&lt;li>Slides is published at &lt;a href="https://slides.nauda.dev/slides/social-engineering/" target="_blank" rel="noopener">slides.nauda.dev&lt;/a>&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="weakest-link-in-cybersecurity-systems">Weakest link in cybersecurity systems&lt;/h2>
&lt;ul>
&lt;li>&amp;ldquo;Humans are the weakest link in cybersecurity systems&amp;rdquo;
&lt;ul>
&lt;li>Unlike technology and processes, people are both predictable and unpredictable .&lt;/li>
&lt;li>They think for themselves and make their own decisions.&lt;/li>
&lt;li>Decisions can be good and other times bad ones, sometimes rational, other times irrational.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
People are error prone because no clear solution is apparent. People are predictable because we know they will make a mistake; however, they can be unpredictable in that we don’t know what the mistake will be. In many instances, people repeat the same mistakes, despite awareness training. At the core, the struggle to always find a way to prevent people from making the same mistake more than once, and the difficulty in anticipating the next, new mistake, makes people the weakest link in the chain.
&lt;/aside>
&lt;hr>
&lt;h2 id="cybercriminals-loves-chaos">Cybercriminals loves chaos&lt;/h2>
&lt;blockquote>
&lt;p>&amp;ldquo;Adversaries love chaos, and this was a time of chaos.&amp;rdquo;&lt;/p>
&lt;/blockquote>
&lt;ul>
&lt;li>COVID-19 pandemic has shifted a variety of everyday activities onto platforms on the Internet, increase in the presence of people on the Internet is almost never preceded by education about cybersecurity.
&lt;ul>
&lt;li>Also, making chilren potential targets for child-specific attacks.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
&lt;p>Increased Online Activity: With more people working, studying, shopping, and socializing online due to lockdowns and remote work, there was a larger pool of potential targets for social engineering attacks. Attackers exploit this increased online presence to launch their scams.&lt;/p>
&lt;p>Remote Work and Remote Learning: The rapid transition to remote work and learning created new vulnerabilities. Employees and students had to adapt to new technologies and communication tools, making them more prone to falling for phishing or impersonation attacks.&lt;/p>
&lt;p>Increased Internet Use by Children: With schools going online, children spent more time on the internet, making them potential targets for child-specific social engineering attacks.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="cybercriminals-loves-chaos-2">Cybercriminals loves chaos (2)&lt;/h2>
&lt;p>Covid-19 imposed a wide range of threats in the realm of cybersecurity.&lt;/p>
&lt;ul>
&lt;li>Economic Hardship&lt;/li>
&lt;li>Fear and Uncertainty&lt;/li>
&lt;li>Remote Healthcare Services&lt;/li>
&lt;li>COVID-19 Themed Scams&lt;/li>
&lt;/ul>
&lt;blockquote>
&lt;p>Cybercrime, especially Social engineering attacks, increases after the COVID-19 pandemic.&lt;/p>
&lt;/blockquote>
&lt;aside class="notes">
&lt;p>The COVID-19 pandemic had a significant impact on cybercrime, leading to various consequences in the realm of cybersecurity. Here are some of the key consequences related to cybercrime during the pandemic:&lt;/p>
&lt;p>Fear and Uncertainty: The pandemic created a climate of fear and uncertainty, which makes people more susceptible to social engineering tactics. Attackers often use fear or urgency to manipulate victims into taking action without thinking rationally.&lt;/p>
&lt;p>Lack of Cybersecurity Training: Many individuals and organizations were unprepared for the sudden shift to remote work, leading to inadequate cybersecurity measures and a lack of awareness about social engineering tactics.&lt;/p>
&lt;p>COVID-19 Themed Scams: Attackers capitalized on the pandemic by sending phishing emails, text messages, and social media messages with COVID-19-related lures, such as fake health advisories, vaccine offers, and financial relief scams. These exploited people&amp;rsquo;s fear and desire for information.&lt;/p>
&lt;p>Isolation and Loneliness: The pandemic led to social isolation, making people more susceptible to social engineering attacks, as they may be more willing to engage with strangers or provide personal information to combat feelings of loneliness.&lt;/p>
&lt;p>Economic Hardship: Many people faced financial difficulties during the pandemic. Attackers preyed on these vulnerabilities with financial scams, such as investment schemes or job offers, which appeared more enticing to those in need.&lt;/p>
&lt;p>Remote Healthcare Services: The healthcare sector also moved more services online, which presented new opportunities for attackers to impersonate healthcare providers, exploit patient trust, and obtain sensitive medical information.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="what-is-se">What is SE?&lt;/h2>
&lt;ul>
&lt;li>&lt;strong>Social engineering&lt;/strong> (SE) is a manipulation technique that exploits human error to gain private information, access, or valuables.&lt;/li>
&lt;/ul>
&lt;blockquote>
&lt;p>“Any act that influences a person to take an action that may or may not be in their best interest” (Christopher Hadnagy, Social Engineering: The Science of Human Hacking. 2nd ed. Hoboken, NJ: Wiley Publishing, 2018).&lt;/p>
&lt;/blockquote>
&lt;hr>
&lt;h2 id="what-is-se-2">What is SE? (2)&lt;/h2>
&lt;ul>
&lt;li>SE is a blend of &lt;em>science, psychology, and art&lt;/em>. While it is amazing and complex, &lt;em>it is also very simple&lt;/em>.&lt;/li>
&lt;li>These “human hacking” scams tend to lure unsuspecting users into
&lt;ul>
&lt;li>Exposing data.&lt;/li>
&lt;li>Spreading malware infections.&lt;/li>
&lt;li>Giving access to restricted systems.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="what-is-se-3">What is SE? (3)&lt;/h2>
&lt;ul>
&lt;li>Scams based on social engineering are built around how people think and act.&lt;/li>
&lt;li>SE attacks are especially useful for manipulating a user’s behavior.
&lt;ul>
&lt;li>Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
Threat actors use social engineering techniques to conceal their true identities and motives, presenting themselves as trusted individuals or information sources. The objective is to influence, manipulate or trick users into releasing sensitive information or access within an organization. Many social engineering exploits rely on people&amp;rsquo;s willingness to be helpful or fear of punishment. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.
&lt;/aside>
&lt;hr>
&lt;h2 id="what-is-se-4">What is SE? (4)&lt;/h2>
&lt;ul>
&lt;li>Hackers also try to exploit a user&amp;rsquo;s lack of knowledge.
&lt;ul>
&lt;li>Thanks to the speed of technology, many consumers and employees aren’t aware of certain threats like &lt;a href="https://usa.kaspersky.com/resource-center/definitions/drive-by-download" target="_blank" rel="noopener">drive-by downloads&lt;/a>.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;blockquote>
&lt;p>Drive by download attacks specifically refer to malicious programs that install to your devices — without your consent.&lt;/p>
&lt;/blockquote>
&lt;aside class="notes">
This also includes unintentional downloads of any files or bundled software onto a computer device. Masked in all corners of the web, these attacks cause even perfectly legitimate sites to spread this threat.
&lt;/aside>
&lt;hr>
&lt;h2 id="what-is-se-5">What is SE? (5)&lt;/h2>
&lt;ul>
&lt;li>Users also may not realize the full value of personal data, like their phone number.&lt;/li>
&lt;li>As a result, many users &lt;em>are unsure how to best protect themselves and their information&lt;/em>.&lt;/li>
&lt;/ul>
&lt;aside class="notes">
Social engineering is a popular tactic among attackers because it is often easier to exploit people than it is to find a network or software vulnerability.
&lt;/aside>
&lt;hr>
&lt;h2 id="what-is-se-6">What is SE? (6)&lt;/h2>
&lt;iframe src="https://player.vimeo.com/video/88895395?h=37de41dcb5" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture" allowfullscreen>&lt;/iframe>
&lt;p>&lt;a href="https://vimeo.com/88895395">What Is Social Engineering?&lt;/a> from &lt;a href="https://vimeo.com/user17562367">Social-Engineer&lt;/a> on &lt;a href="https://vimeo.com">Vimeo&lt;/a>.&lt;/p>
&lt;hr>
&lt;h2 id="se-goals">SE Goals&lt;/h2>
&lt;ol>
&lt;li>Sabotage: Disrupting or corrupting data to cause harm or inconvenience.&lt;/li>
&lt;li>Theft: Obtaining valuables like information, access, or money.&lt;/li>
&lt;/ol>
&lt;hr>
&lt;h2 id="how-se-work">How SE work&lt;/h2>
&lt;blockquote>
&lt;p>Most social engineering attacks rely on actual communication between attackers and victims.&lt;/p>
&lt;/blockquote>
&lt;p>The attacker tends to &lt;em>motivate the user into compromising themselves&lt;/em>, rather than using brute force methods to breach your data.&lt;/p>
&lt;hr>
&lt;h2 id="how-se-work-2---se-attack-cycle">How SE work (2) - SE attack cycle&lt;/h2>
&lt;p>The attack cycle gives these criminals a reliable process for deceiving you.&lt;/p>
&lt;ol>
&lt;li>&lt;strong>Prepare&lt;/strong> by gathering background information on you or a larger group you are a part of.&lt;/li>
&lt;li>&lt;strong>Infiltrate&lt;/strong> by establishing a relationship or initiating an interaction, started by building trust.&lt;/li>
&lt;li>&lt;strong>Exploit&lt;/strong> the victim once trust and a weakness are established to advance the attack.&lt;/li>
&lt;li>&lt;strong>Disengage&lt;/strong> once the user has taken the desired action.&lt;/li>
&lt;/ol>
&lt;hr>
&lt;h2 id="how-se-work-3---se-attack-cycle">How SE work (3) - SE attack cycle&lt;/h2>
&lt;ul>
&lt;li>
&lt;p>This process can take place in:&lt;/p>
&lt;ul>
&lt;li>A single email&lt;/li>
&lt;li>Over months in a series of social media chats.&lt;/li>
&lt;li>A face-to-face interaction&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Beware of social engineering as a means of confusion.&lt;/p>
&lt;ul>
&lt;li>Few pieces of information can give hackers access to multiple networks and accounts.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="how-se-work-3---a-common-scenario">How SE work (3) - A common scenario&lt;/h2>
&lt;ul>
&lt;li>By masquerading as legitimate users to IT support personnel, they grab your private details — like name, date of birth or address.&lt;/li>
&lt;li>From there, it&amp;rsquo;s a simple matter to reset passwords and gain almost unlimited access.&lt;/li>
&lt;li>They can steal money, disperse social engineering malware.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="traits-of-se-attacks">Traits of SE Attacks&lt;/h2>
&lt;ul>
&lt;li>Social engineering attacks center around the attacker’s use of persuasion and confidence.&lt;/li>
&lt;li>When exposed to these tactics, you are more likely to take actions you otherwise wouldn’t.&lt;/li>
&lt;/ul>
&lt;aside class="notes">
[End]
Among most attacks, you’ll find yourself being misled into the following behaviors:
&lt;/aside>
&lt;hr>
&lt;h2 id="traits-of-se-attacks-2---heightened-emotions">Traits of SE Attacks (2) - Heightened emotions&lt;/h2>
&lt;ul>
&lt;li>Emotional manipulation gives attackers the upper hand in an any interaction.
&lt;ul>
&lt;li>You are far more likely to take irrational or risky actions when in an enhanced emotional state.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
The following emotions are all used in equal measure to convince you.
&lt;/aside>
&lt;blockquote>
&lt;p>Fear, Excitement, Curiosity, Anger, Guilt, Sadness&lt;/p>
&lt;/blockquote>
&lt;hr>
&lt;h2 id="traits-of-se-attacks-3---urgency">Traits of SE Attacks (3) - Urgency&lt;/h2>
&lt;ul>
&lt;li>Time-sensitive opportunities or requests are another reliable tool in an attacker’s arsenal.&lt;/li>
&lt;li>You may be motivated to compromise yourself under the guise of a serious problem that needs immediate attention.&lt;/li>
&lt;li>Alternatively, you may be exposed to a prize or reward that may disappear if you do not act quickly.&lt;/li>
&lt;li>Either approach overrides your critical thinking ability.&lt;/li>
&lt;/ul>
&lt;aside class="notes">
The following emotions are all used in equal measure to convince you.
&lt;/aside>
&lt;hr>
&lt;h2 id="traits-of-se-attacks-4---trust">Traits of SE Attacks (4) - Trust&lt;/h2>
&lt;ul>
&lt;li>Believability is invaluable and essential to a social engineering attack.&lt;/li>
&lt;li>Since the attacker is ultimately lying to you, confidence plays an important role here.
&lt;ul>
&lt;li>They’ve done enough research on you to craft a narrative that’s easy to believe and unlikely to rouse suspicion.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="traits-of-se-attacks-5---trust-2">Traits of SE Attacks (5) - Trust (2)&lt;/h2>
&lt;ul>
&lt;li>In some cases, attackers use more simplistic methods of social engineering to gain network or computer access.&lt;/li>
&lt;li>For example, a hacker might frequent the public food court of a large office building and &amp;ldquo;shoulder surf&amp;rdquo; users working on their tablets or laptops.
&lt;ul>
&lt;li>Doing so can result in a large number of passwords and usernames, all without sending an email or writing a line of virus code.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="types-of-se-attacks">Types of SE Attacks&lt;/h2>
&lt;ul>
&lt;li>Almost every type of cybersecurity attack contains some kind of social engineering. For example, the classic email and virus scams are laden with social overtones.&lt;/li>
&lt;li>Social engineering can impact you digitally through mobile attacks in addition to desktop devices.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="types-of-se-attacks-2">Types of SE Attacks (2)&lt;/h2>
&lt;ul>
&lt;li>However, you can just as easily be faced with a threat in-person.&lt;/li>
&lt;/ul>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img src="https://imgs.xkcd.com/comics/security.png" alt="" loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
These attacks can overlap and layer onto each other to create a scam.
&lt;/aside>
&lt;hr>
&lt;h2 id="phishing-attacks">Phishing Attacks&lt;/h2>
&lt;ul>
&lt;li>Phishing attackers pretend to be a trusted institution or individual in an attempt to persuade you to expose personal data and other valuables.
&lt;ol>
&lt;li>&lt;strong>Spam phishing&lt;/strong>, or &lt;strong>mass phishing&lt;/strong>, is a widespread attack aimed at many users. These attacks are non-personalized and try to catch any unsuspecting person.&lt;/li>
&lt;li>&lt;strong>Spear phishing&lt;/strong> and by extension, &lt;strong>whaling&lt;/strong> , use personalized info to target particular users.&lt;/li>
&lt;/ol>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-attacks-2">Phishing Attacks (2)&lt;/h2>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/slides/social-engineering/whatis-whaling_vs_phising-f_hu9d62ca8ba94a47943904e8fd745b782f_33319_1a14b0349741e31c41a6e0e85d88d1ce.webp 400w,
/slides/social-engineering/whatis-whaling_vs_phising-f_hu9d62ca8ba94a47943904e8fd745b782f_33319_942fa45701929ac5276070d09b6b1453.webp 760w,
/slides/social-engineering/whatis-whaling_vs_phising-f_hu9d62ca8ba94a47943904e8fd745b782f_33319_1200x1200_fit_q75_h2_lanczos_3.webp 1200w"
src="https://slides.nauda.dev/slides/social-engineering/whatis-whaling_vs_phising-f_hu9d62ca8ba94a47943904e8fd745b782f_33319_1a14b0349741e31c41a6e0e85d88d1ce.webp"
width="760"
height="453"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
&lt;p>Whaling attacks specifically aim at high-value targets like celebrities, upper management, and high government officials.&lt;/p>
&lt;p>[END]&lt;/p>
&lt;p>Whether it’s a direct communication or via a fake website form, anything you share goes directly into a scammer’s pocket. You may even be fooled into a malware download containing the next stage of the phishing attack. Methods used in phishing each have unique modes of delivery, including but not limited to:&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="phishing-methods---voice-phishing">Phishing Methods - Voice phishing&lt;/h2>
&lt;ul>
&lt;li>Voice phishing (vishing) phone calls may be automated message systems recording all your inputs.&lt;/li>
&lt;li>Sometimes, a live person might speak with you to increase trust and urgency.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---sms-phishing">Phishing Methods - SMS phishing&lt;/h2>
&lt;ul>
&lt;li>SMS phishing (smishing) texts or mobile app messages might include a web link or a prompt to follow-up via a fraudulent email or phone number.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---email-phishing">Phishing Methods - Email phishing&lt;/h2>
&lt;ul>
&lt;li>Email phishing is the most traditional means of phishing, using an email urging you to reply or follow-up by other means. Web links, phone numbers, or malware attachments can be used.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---angler-phishing">Phishing Methods - Angler phishing&lt;/h2>
&lt;ul>
&lt;li>Angler phishing takes place on social media, where an attacker imitates a trusted company’s customer service team.
&lt;ul>
&lt;li>They intercept your communications with a brand to hijack and divert your conversation into private messages, where they then advance the attack.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---search-engine-phishing">Phishing Methods - Search engine phishing&lt;/h2>
&lt;ul>
&lt;li>Search engine phishing attempt to place links to fake websites at the top of search results.
&lt;ul>
&lt;li>These may be paid ads or use legitimate optimization methods to manipulate search rankings.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---url-phishing">Phishing Methods - URL phishing&lt;/h2>
&lt;ul>
&lt;li>URL phishing links tempt you to travel to phishing websites.
&lt;ul>
&lt;li>These links are commonly delivered in emails, texts, social media messages, and online ads.&lt;/li>
&lt;li>Attacks hide links in hyperlinked text or buttons, using link-shortening tools, or deceptively spelled URLs.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="phishing-methods---in-session-phishing">Phishing Methods - In-session phishing&lt;/h2>
&lt;ul>
&lt;li>In-session phishing appears as an interruption to your normal web browsing. For example, you may see such as fake login pop-ups for pages you’re currently visiting.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="baiting-attacks">Baiting Attacks&lt;/h2>
&lt;ul>
&lt;li>&lt;strong>Baiting&lt;/strong> abuses your natural curiosity to coax you into exposing yourself to an attacker.
&lt;ul>
&lt;li>Typically, potential for something free or exclusive is the manipulation used to exploit you.&lt;/li>
&lt;li>The attack usually involves infecting you with malware.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="baiting-methods">Baiting Methods&lt;/h2>
&lt;ul>
&lt;li>USB drives left in public spaces, like libraries and parking lots.&lt;/li>
&lt;li>Email attachments including details on a free offer, or fraudulent free software.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="physical-breach-attacks">Physical Breach Attacks&lt;/h2>
&lt;ul>
&lt;li>Physical breaches involve attackers appearing in-person, posing as someone legitimate to gain access to otherwise unauthorized areas or information, most common in enterprise environments, such as governments, army, businesses, or other organizations.
&lt;ul>
&lt;li>Attackers may pretend to be a representative of a known, trusted vendor for the company.
&lt;ul>
&lt;li>Some attackers may even be recently fired employees with a vendetta against their former employer.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
&lt;p>[END]&lt;/p>
&lt;p>They make their identity obscure but believable enough to avoid questions. This requires a bit of research on the attacker’s part and involves high-risk. So, if someone is attempting this method, they’ve identified clear potential for a highly valuable reward if successful.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="pretexting-attacks">Pretexting Attacks&lt;/h2>
&lt;ul>
&lt;li>Pretexting uses a deceptive identity as the “pretext” for establishing trust, such as directly impersonating a vendor or a facility employee.
&lt;ul>
&lt;li>This approach requires the attacker to interact with you more proactively. The exploit follows once they’ve convinced you they are legitimate.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="access-tailgating-attacks">Access Tailgating Attacks&lt;/h2>
&lt;ul>
&lt;li>Tailgating , or piggybacking, is the act of trailing an authorized staff member into a restricted-access area. Attackers may play on social courtesy to get you to hold the door for them or convince you that they are also authorized to be in the area.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="quid-pro-quo-attacks">Quid Pro Quo Attacks&lt;/h2>
&lt;ul>
&lt;li>&lt;em>Quid pro quo&lt;/em> is a term roughly meaning “a favor for a favor,”.&lt;/li>
&lt;li>The exploit comes from getting you excited for something valuable that comes with a low investment on your end. However, the attacker simply takes your data with no reward for you.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="dumpster-diving-attacks">Dumpster diving attacks&lt;/h2>
&lt;ul>
&lt;li>Dumpster diving is a social engineering attack whereby a person searches a company&amp;rsquo;s trash to find information, such as passwords or access codes written on sticky notes or scraps of paper, that could be used to infiltrate the organization&amp;rsquo;s network.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="other-attacks">Other attacks&lt;/h2>
&lt;ul>
&lt;li>DNS Spoofing: manipulates your browser and web servers to travel to malicious websites when you enter a legitimate URL.&lt;/li>
&lt;li>Cache Poisoning Attacks specifically infect your device with routing instructions for the legitimate URL or multiple URLs to connect to fraudulent websites.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="other-attacks-2">Other attacks (2)&lt;/h2>
&lt;ul>
&lt;li>Scareware Attacks is a form of malware used to frighten you into taking an action. This deceptive malware uses alarming warnings that report fake malware infections or claim one of your accounts has been compromised.&lt;/li>
&lt;li>Watering Hole Attacks look for existing vulnerabilities that are not known and patched — such weaknesses are deemed zero-day exploits.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="other-attacks-3">Other attacks (3)&lt;/h2>
&lt;ul>
&lt;li>Fax-based phishing.&lt;/li>
&lt;/ul>
&lt;aside class="notes">
&lt;p>When one bank’s customers received a fake email that claimed to be from the bank — asking the customer to confirm their access codes – the method of confirmation was not via the usual email / Internet routes. Instead, the customer was asked to print out the form in the email, then fill in their details and fax the form to the cybercriminal’s telephone number.&lt;/p>
&lt;p>In Japan, cybercriminals used a home-delivery service to distribute CDs that were infected with Trojan spyware. The disks were delivered to the clients of a Japanese bank. The clients’ addresses had previously been stolen from the bank’s database.&lt;/p>
&lt;/aside>
&lt;ul>
&lt;li>Traditional mail malware distribution&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="other-attacks-4---simple-unusual-attack">Other attacks (4) - Simple unusual attack&lt;/h2>
&lt;ul>
&lt;li>Simple Social Engineering Trick with a phone call and crying baby&lt;/li>
&lt;/ul>
&lt;iframe width="560" height="315" src="https://www.youtube.com/embed/lc7scxvKQOo?si=xWuUJYGpv14vPekJ" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen>&lt;/iframe>
&lt;hr>
&lt;h2 id="examples---trojan-horse">Examples - Trojan horse&lt;/h2>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/slides/social-engineering/minecraft-trojan-horse_hua78977043a4d62f05fda09c590d70df0_86384_70ee4243d18be52b102e7396cf778302.webp 400w,
/slides/social-engineering/minecraft-trojan-horse_hua78977043a4d62f05fda09c590d70df0_86384_e1d2b333b94fa889fb24856eaaa3f399.webp 760w,
/slides/social-engineering/minecraft-trojan-horse_hua78977043a4d62f05fda09c590d70df0_86384_1200x1200_fit_q75_h2_lanczos.webp 1200w"
src="https://slides.nauda.dev/slides/social-engineering/minecraft-trojan-horse_hua78977043a4d62f05fda09c590d70df0_86384_70ee4243d18be52b102e7396cf778302.webp"
width="506"
height="500"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
Perhaps the most famous example of a social engineering attack comes from the legendary Trojan War in which the Greeks were able to sneak into the city of Troy and win the war by hiding inside a giant wooden horse that was presented to the Trojan army as a symbol of peace.
&lt;/aside>
&lt;hr>
&lt;h2 id="examples---frank-abagnale">Examples - Frank Abagnale&lt;/h2>
&lt;ul>
&lt;li>Used various tactics to impersonate at least eight people, including an airline pilot, a doctor and a lawyer.&lt;/li>
&lt;/ul>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/slides/social-engineering/frank-abagnale_hu3fa27d96601888550e365d3230793f8c_186825_e7ac6f068b98068296bb86f5312b3a02.webp 400w,
/slides/social-engineering/frank-abagnale_hu3fa27d96601888550e365d3230793f8c_186825_01e4e04d5ee876d1fafec3a008c6889a.webp 760w,
/slides/social-engineering/frank-abagnale_hu3fa27d96601888550e365d3230793f8c_186825_1200x1200_fit_q75_h2_lanczos.webp 1200w"
src="https://slides.nauda.dev/slides/social-engineering/frank-abagnale_hu3fa27d96601888550e365d3230793f8c_186825_e7ac6f068b98068296bb86f5312b3a02.webp"
width="500"
height="333"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
In more modern times, Frank Abagnale is considered one of the foremost experts in social engineering techniques. In the 1960s, he used various tactics to impersonate at least eight people, including an airline pilot, a doctor and a lawyer. Abagnale was also a check forger during this time. After his incarceration, he became a security consultant for the Federal Bureau of Investigation and started his own financial fraud consultancy. His experiences as a young con man were made famous in his best-selling book Catch Me If You Can and the movie adaptation from Oscar-winning director Steven Spielberg.
&lt;/aside>
&lt;hr>
&lt;h2 id="examples---worm-attacks">Examples - Worm Attacks&lt;/h2>
&lt;ul>
&lt;li>The cybercriminal will aim to attract the user’s attention to the link or infected file – and then get the user to click on it.
&lt;ul>
&lt;li>The &lt;a href="http://virus.wikidot.com/loveletter" target="_blank" rel="noopener">Loveletter worm&lt;/a> that overloaded many companies’ email servers in 2000&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img src="./LoveAttach.gif" alt="" loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
&lt;p>The virus arrives in an email with the subject line of &amp;ldquo;ILOVEYOU&amp;rdquo; with an attachment &amp;ldquo;LOVE-LETTER-FOR-YOU.TXT.vbs&amp;rdquo; that people were encouraged to open. The message body is &amp;ldquo;kindly check the attached LOVELETTER coming from me.&amp;rdquo; The sender line will be the address it was sent from. The user must download and execute the worm by clicking on it.&lt;/p>
&lt;p>The &lt;a href="http://virus.wikidot.com/loveletter" target="_blank" rel="noopener">Loveletter worm&lt;/a>, memorable for its &amp;ldquo;LOVE-LETTER-FOR-YOU&amp;rdquo; attachment and &amp;ldquo;ILOVEYOU&amp;rdquo; subject line, was one of the early worms to gain a great deal of media attention. It was also one of the first to reportedly reach a multi-billion dollar damage toll.&lt;/p>
&lt;p>When the worm is executed, it copies itself as the files LOVE-LETTER-FOR-YOU.TXT.VBS and MSKERNEL32.VBS in the Windows_system_folder and WIN32DLL.VBS in the Windows directory. It creates its own key named MSKernel32 under the Local machine registry key that causes programs to run and adds the value MSKERNEL32.VBS to it. It also create a new Local Machine RunServices key named Win32DLL and adds WIN32DLL.VBS as a value to it, so it will run when the system boots, before the user even logs on.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="examples---kevin-mitnick">Examples - Kevin Mitnick&lt;/h2>
&lt;ul>
&lt;li>Mitnick called Motorola, then convinced a Motorola employee that he was a colleague and persuaded that worker to send him the source code for the MicroTAC Ultra Lite, the company&amp;rsquo;s new flip phone.&lt;/li>
&lt;/ul>
&lt;p>
&lt;figure >
&lt;div class="d-flex justify-content-center">
&lt;div class="w-100" >&lt;img alt="" srcset="
/slides/social-engineering/kevin-mitnick_hue0d053b2a6c6df009608622d632d9b0a_82550_1f2969dc3b9a07d5de4c90ec9332a578.webp 400w,
/slides/social-engineering/kevin-mitnick_hue0d053b2a6c6df009608622d632d9b0a_82550_cfa94ee813af6830f125149b4a3ebf83.webp 760w,
/slides/social-engineering/kevin-mitnick_hue0d053b2a6c6df009608622d632d9b0a_82550_1200x1200_fit_q75_h2_lanczos.webp 1200w"
src="https://slides.nauda.dev/slides/social-engineering/kevin-mitnick_hue0d053b2a6c6df009608622d632d9b0a_82550_1f2969dc3b9a07d5de4c90ec9332a578.webp"
width="760"
height="443"
loading="lazy" data-zoomable />&lt;/div>
&lt;/div>&lt;/figure>
&lt;/p>
&lt;aside class="notes">
&lt;p>Once known as &amp;ldquo;the world&amp;rsquo;s most wanted hacker,&amp;rdquo; Kevin Mitnick persuaded a Motorola worker to give him the source code for the MicroTAC Ultra Lite, the company&amp;rsquo;s new flip phone. It was 1992, and Mitnick, who was on the run from police, was living in Denver under an assumed name. At the time, he was concerned about being tracked by the federal government. To conceal his location from authorities, Mitnick used the source code to hack the Motorola MicroTAC Ultra Lite and then sought to change the phone&amp;rsquo;s identifying data or turn off the ability for cellphone towers to connect to the phone.&lt;/p>
&lt;p>To obtain the source code for the device, Mitnick called Motorola and was connected to the department working on it. He then convinced a Motorola employee that he was a colleague and persuaded that worker to send him the source code. Mitnick was ultimately arrested and served five years for hacking. Today, he is a multimillionaire and the author of a number of books on hacking and security. A sought-after speaker, Mitnick also runs cybersecurity company Mitnick Security.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="examples---rsahttpswwwrsacom-data-breach">Examples - &lt;a href="https://www.rsa.com/" target="_blank" rel="noopener">RSA&lt;/a> Data breach&lt;/h2>
&lt;ul>
&lt;li>An attacker sent two different phishing emails over two days to small groups of RSA employees.
&lt;ul>
&lt;li>The emails had the subject line &amp;ldquo;2011 Recruitment Plan&amp;rdquo; attaching an Excel file attachment contained malicious code that, once the file was opened, installed a backdoor through an Adobe Flash vulnerability.&lt;/li>
&lt;li>RSA&amp;rsquo;s SecurID two-factor authentication (2FA) system was compromised, and the company spent approximately $66 million recovering from the attack.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
RSA provides identity security solutions for the world&amp;rsquo;s most security-sensitive organizations. RSA delivers automated identity intelligence, authentication, access, governance, and lifecycle capabilities to defend against the highest-impact cybersecurity risks.
&lt;/aside>
&lt;hr>
&lt;h2 id="how-to-spot">How to spot&lt;/h2>
&lt;ul>
&lt;li>Defending against social engineering requires you to practice self-awareness. Always slow down and think before doing anything or responding.&lt;/li>
&lt;li>Attackers expect you to take action before considering the risks, which means you should do the opposite.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h2 id="how-to-spot-2">How to spot (2)&lt;/h2>
&lt;p>Some questions to ask yourself if you suspect an attack:&lt;/p>
&lt;ul>
&lt;li>Are my emotions heightened?&lt;/li>
&lt;li>Did this message come from a legitimate sender?&lt;/li>
&lt;li>Did my friend actually send this message to me?&lt;/li>
&lt;li>Does the website I’m on have odd details?&lt;/li>
&lt;li>Does this offer sound too good to be true?&lt;/li>
&lt;li>Attachments or links suspicious?&lt;/li>
&lt;li>Can this person prove their identity?&lt;/li>
&lt;/ul>
&lt;aside class="notes">
&lt;ul>
&lt;li>Are my emotions heightened? When you’re especially curious, fearful, or excited, you’re less likely to evaluate the consequences of your actions. In fact, you probably will not consider the legitimacy of the situation presented to you. Consider this a red flag if your emotional state is elevated.&lt;/li>
&lt;li>Did this message come from a legitimate sender? Inspect email addresses and social media profiles carefully when getting a suspect message. There may be characters that mimic others, such as “torn@example.com” instead of “tom@example.com.” Fake social media profiles that duplicate your friend’s picture and other details are also common.&lt;/li>
&lt;li>Did my friend actually send this message to me? It’s always good to ask the sender if they were the true sender of the message in question. Whether it was a coworker or another person in your life, ask them in-person or via a phone call if possible. They may be hacked and not know, or someone may be impersonating their accounts.&lt;/li>
&lt;li>Does the website I’m on have odd details? Irregularities in the URL, poor image quality, old or incorrect company logos, and webpage typos can all be red flags of a fraudulent website. If you enter a spoofed website, be sure to leave immediately.&lt;/li>
&lt;li>Does this offer sound too good to be true? In the case of giveaways or other targeting methods, offers are a strong motivation to drive a social engineering attack forward. You should consider why someone is offering you something of value for little gain on their end. Be wary at all times because even basic data like your email address can be harvested and sold to unsavory advertisers.&lt;/li>
&lt;li>Attachments or links suspicious? If a link or file name appears vague or odd in a message, reconsider the authenticity of the whole communication. Also, consider if the message itself was sent in an odd context, time, or raises any other red flags.&lt;/li>
&lt;li>Can this person prove their identity? If you cannot get this person to verify their identity with the organization, they claim to be a part of, do not allow them the access they are asking for. This applies both in-person and online, as physical breaches require that you overlook the attacker’s identity.&lt;/li>
&lt;/ul>
&lt;/aside>
&lt;hr>
&lt;h2 id="how-to-prevent">How to Prevent&lt;/h2>
&lt;p>Beyond spotting an attack, you can also be proactive about your privacy and security. Knowing how to prevent social engineering attacks is incredibly important for all mobile and computer users.&lt;/p>
&lt;hr>
&lt;h2 id="how-to-prevent-2---safe-communication-and-account-management-habits">How to Prevent (2) - Safe Communication and Account Management Habits&lt;/h2>
&lt;ol>
&lt;li>Never click on links in any emails or messages.&lt;/li>
&lt;li>Use multi-factor authentication.&lt;/li>
&lt;li>Use strong passwords (and a password manager).&lt;/li>
&lt;li>Avoid sharing names of your schools, pets, place of birth, or other personal details.&lt;/li>
&lt;li>Be very cautious of building online-only friendships.&lt;/li>
&lt;/ol>
&lt;aside class="notes">
&lt;p>&lt;strong>Never click on links in any emails or messages&lt;/strong> . You’ll want to always manually type a URL into your address bar, regardless of the sender. However, take the extra step of investigating to find an official version of the URL in question. Never engage with any URL you have not verified as official or legitimate.&lt;/p>
&lt;p>&lt;strong>Use multi-factor authentication&lt;/strong>. Online accounts are much safer when using more than just a password to protect them. Multi-factor authentication adds extra layers to verify your identity upon account login. These “factors” can include biometrics like fingerprint or facial recognition, or temporary passcodes sent via text message.&lt;/p>
&lt;p>&lt;strong>Use strong passwords (and a password manager)&lt;/strong>. Each of your passwords should be unique and complex. Aim to use diverse character types, including uppercase, numbers, and symbols. Also, you will probably want to opt for longer passwords when possible. To help you manage all your custom passwords, you might want to use a password manager to safely store and remember them.&lt;/p>
&lt;p>&lt;strong>Avoid sharing names of your schools, pets, place of birth, or other personal details&lt;/strong>. You could be unknowingly exposing answers to your security questions or parts of your password. If you set up your security questions to be memorable but inaccurate, you’ll make it harder for a criminal to crack your account. If your first car was a “Toyota,” writing a lie like “clown car” instead could completely throw off any prying hackers.&lt;/p>
&lt;p>&lt;strong>Be very cautious of building online-only friendships&lt;/strong>. While the internet can be a great way to connect with people worldwide, this is a common method for social engineering attacks. Watch for tells and red flags that indicate manipulation or a clear abuse of trust.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="how-to-prevent-3---safe-network-use-habits">How to Prevent (3) - Safe Network Use Habits&lt;/h2>
&lt;ol>
&lt;li>Never let strangers connect to your primary Wi-Fi network.&lt;/li>
&lt;li>Use a VPN.&lt;/li>
&lt;li>Keep all network-connected devices and services secure.&lt;/li>
&lt;/ol>
&lt;aside class="notes">
&lt;p>Compromised online networks can be another point of vulnerability exploited for background research. To avoid having your data used against you, take protective measures for any network you’re connected to.&lt;/p>
&lt;p>Never let strangers connect to your primary Wi-Fi network. At home or in the workplace, access to a guest Wi-Fi connection should be made available. This allows your main encrypted, password-secured connection to remain secure and interception-free. Should someone decide to “eavesdrop” for information, they won’t be able to access the activity you and others would like to keep private.&lt;/p>
&lt;p>Use a VPN . In case someone on your main network — wired, wireless, or even cellular — finds a way to intercept traffic, a virtual private network (VPN) can keep them out. VPNs are services that give you a private, encrypted “tunnel” on any internet connection you use. Your connection is not only guarded from unwanted eyes, but your data is anonymized so it cannot be traced back to you via cookies or other means.&lt;/p>
&lt;p>Keep all network-connected devices and services secure. Many people are aware of internet security practices for mobile and traditional computer devices. However, securing your network itself, in addition to all your smart devices and cloud services is just as important. Be sure to protect commonly overlooked devices like car infotainment systems and home network routers. Data breaches on these devices could fuel personalization for a social engineering scam.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="how-to-prevent-4---safe-device-use-habits">How to Prevent (4) - Safe Device Use Habits&lt;/h2>
&lt;ol>
&lt;li>Use comprehensive internet security software.&lt;/li>
&lt;li>Don’t ever leave your devices unsecured in public.&lt;/li>
&lt;li>Keep all your software updated as soon as available.&lt;/li>
&lt;li>Check for known data breaches of your online accounts.&lt;/li>
&lt;/ol>
&lt;aside class="notes">
&lt;p>Keeping your devices themselves is just as important as all your other digital behaviors. Protect your mobile phone, tablet, and other computer devices with the tips below:&lt;/p>
&lt;p>Use comprehensive internet security software. In the event that social tactics are successful, malware infections are a common outcome. To combat rootkits, Trojans and other bots, it&amp;rsquo;s critical to employ a high-quality internet security solution that can both eliminate infections and help track their source.&lt;/p>
&lt;p>Don’t ever leave your devices unsecured in public. Always lock your computer and mobile devices, especially at work. When using your devices in public spaces like airports and coffee shops, always keep them in your possession.&lt;/p>
&lt;p>Keep all your software updated as soon as available. Immediate updates give your software essential security fixes. When you skip or delay updates to your operating system or apps, you are leaving known security holes exposed for hackers to target. Since they know this is a behavior of many computer and mobile users, you become a prime target for socially engineered malware attacks.&lt;/p>
&lt;p>Check for known data breaches of your online accounts. Services like Kaspersky Security Cloud actively monitor new and existing data breaches for your email addresses. If your accounts are included in compromised data, you’ll receive a notification along with advice on how to take action.&lt;/p>
&lt;/aside>
&lt;hr>
&lt;h2 id="summary">Summary&lt;/h2>
&lt;ul>
&lt;li>Protection against social engineering starts with education.
&lt;ul>
&lt;li>If all users are aware of the threats, our safety as a collective society will improve.&lt;/li>
&lt;li>Be sure to increase awareness of these risks by sharing what you’ve learned with your coworkers, family, and friends.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;aside class="notes">
&lt;ul>
&lt;li>Protection against social engineering starts with education.
&lt;ul>
&lt;li>If all users are aware of the threats, our safety as a collective society will improve.&lt;/li>
&lt;li>Be sure to increase awareness of these risks by sharing what you’ve learned with your coworkers, family, and friends.&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;/aside>
&lt;hr>
&lt;h2 id="references">References&lt;/h2>
&lt;ul>
&lt;li>&lt;a href="https://usa.kaspersky.com/resource-center/definitions/what-is-social-engineering" target="_blank" rel="noopener">[Kaspersky] What is Social Engineering?&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://owasp.org/www-pdf-archive/Presentation_Social_Engineering.pdf" target="_blank" rel="noopener">OWASP Slides of Social Engineering&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.techtarget.com/searchsecurity/definition/social-engineering" target="_blank" rel="noopener">[TechTarget] Social Engineering&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://github.com/giuliacassara/awesome-social-engineering" target="_blank" rel="noopener">[Github] awesome-social-engineering&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.social-engineer.org/" target="_blank" rel="noopener">social-engineer.org&lt;/a>&lt;/li>
&lt;/ul>
&lt;hr>
&lt;h1 id="qa">Q&amp;amp;A&lt;/h1>
&lt;hr>
&lt;h1 id="thank-you">Thank you!&lt;/h1></description></item></channel></rss>