Home
Forums
NAIJAFANS TV
NAIJAFANS RADIO
New posts
Trending
Search forums
What's new
New posts
New listings
New resources
New profile posts
Latest activity
Classifieds
New listings
Resources
Latest reviews
Search resources
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
Menu
Log in
Register
Install the app
Install
Home
Webmasters / Bloggers
social engineering and examples social engineering
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Yorubaboy" data-source="post: 1208" data-attributes="member: 7"><p><h3>[ATTACH=full]376[/ATTACH]</h3><h3>What is social engineering</h3><p>Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.</p><p>Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended victim to gather necessary background information, such as potential points of entry and weak security protocols, needed to proceed with the attack. Then, the <a href="https://www.imperva.com/learn/application-security/ethical-hacking/" target="_blank">attacker</a> moves to gain the victim’s trust and provide stimuli for subsequent actions that break security practices, such as revealing <a href="https://www.imperva.com/learn/data-security/sensitive-data/" target="_blank">sensitive information or granting access to critical resources</a>.</p><p><img src="https://www.imperva.com/learn/wp-content/uploads/sites/13/2019/01/social-engineering.png" alt="Social Engineering Attack Lifecycle" class="fr-fic fr-dii fr-draggable " style="" /></p><p>Social Engineering Attack Lifecycle</p><p>What makes social engineering especially dangerous is that it relies on human error, rather than vulnerabilities in software and operating systems. Mistakes made by legitimate users are much less predictable, making them harder to identify and thwart than a malware-based intrusion.</p><h3>Social engineering attack techniques</h3><p>Social engineering attacks come in many different forms and can be performed anywhere where human interaction is involved. The following are the five most common forms of digital social engineering assaults.</p><h4><strong>Baiting</strong></h4><p>As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware.</p><p>The most reviled form of baiting uses physical media to disperse malware. For example, attackers leave the bait—typically malware-infected flash drives—in conspicuous areas where potential victims are certain to see them (e.g., bathrooms, elevators, the parking lot of a targeted company). The bait has an authentic look to it, such as a label presenting it as the company’s payroll list.</p><p>Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting in automatic malware installation on the system.</p><p>Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting consist of enticing ads that lead to malicious sites or that encourage users to download a malware-infected application.</p><h4><strong>Scareware</strong></h4><p>Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no real benefit (other than for the perpetrator) or is malware itself. Scareware is also referred to as deception software, rogue scanner software and fraudware.</p><p>A common scareware example is the legitimate-looking popup banners appearing in your browser while surfing the web, displaying such text such as, “Your computer may be infected with harmful spyware programs.” It either offers to install the tool (often malware-infected) for you, or will direct you to a malicious site where your <a href="https://www.imperva.com/learn/application-security/cyber-security/" target="_blank">computer becomes infected</a>.</p><p>Scareware is also distributed via spam email that doles out bogus warnings, or makes offers for users to buy worthless/harmful services.</p><h4><strong>Pretexting</strong></h4><p>Here an attacker obtains information through a series of cleverly crafted lies. The scam is often initiated by a perpetrator pretending to need sensitive information from a victim so as to perform a critical task.</p><p>The attacker usually starts by establishing trust with their victim by impersonating co-workers, police, bank and tax officials, or other persons who have right-to-know authority. The pretexter asks questions that are ostensibly required to confirm the victim’s identity, through which they gather important personal data.</p><p>All sorts of pertinent information and records is gathered using this scam, such as social security numbers, personal addresses and phone numbers, phone records, staff vacation dates, bank records and even security information related to a physical plant.</p><h4><strong>Phishing</strong></h4><p>As one of the most popular social engineering attack types, <a href="https://www.imperva.com/learn/application-security/phishing-attack-scam/" target="_blank">phishing</a> scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods them into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware.</p><p>An example is an email sent to users of an online service that alerts them of a policy violation requiring immediate action on their part, such as a required password change. It includes a link to an illegitimate website—nearly identical in appearance to its legitimate version—prompting the unsuspecting user to enter their current credentials and new password. Upon form submittal the information is sent to the attacker.</p><p>Given that identical, or near-identical, messages are sent to all users in phishing campaigns, detecting and blocking them are much easier for mail servers having access to <a href="https://www.imperva.com/learn/application-security/cyber-security-threats/" target="_blank">threat</a> sharing platforms.</p><h4><strong>Spear phishing</strong></h4><p>This is a more targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises. They then tailor their messages based on characteristics, job positions, and contacts belonging to their victims to make their attack less conspicuous. <a href="https://www.imperva.com/learn/application-security/spear-phishing/" target="_blank">Spear phishing</a> requires much more effort on behalf of the perpetrator and may take weeks and months to pull off. They’re much harder to detect and have better success rates if done skillfully.</p><p>A spear phishing scenario might involve an attacker who, in impersonating an organization’s IT consultant, sends an email to one or more employees. It’s worded and signed exactly as the consultant normally does, thereby deceiving recipients into thinking it’s an authentic message. The message prompts recipients to change their password and provides them with a link that redirects them to a malicious page where the attacker now captures their credentials.</p><p></p><p>[URL unfurl="true"]https://www.imperva.com/learn/application-security/social-engineering-attack/[/URL]</p></blockquote><p></p>
[QUOTE="Yorubaboy, post: 1208, member: 7"] [HEADING=2][ATTACH type="full"]376[/ATTACH][/HEADING] [HEADING=2]What is social engineering[/HEADING] Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended victim to gather necessary background information, such as potential points of entry and weak security protocols, needed to proceed with the attack. Then, the [URL='https://www.imperva.com/learn/application-security/ethical-hacking/']attacker[/URL] moves to gain the victim’s trust and provide stimuli for subsequent actions that break security practices, such as revealing [URL='https://www.imperva.com/learn/data-security/sensitive-data/']sensitive information or granting access to critical resources[/URL]. [IMG alt="Social Engineering Attack Lifecycle"]https://www.imperva.com/learn/wp-content/uploads/sites/13/2019/01/social-engineering.png[/IMG] Social Engineering Attack Lifecycle What makes social engineering especially dangerous is that it relies on human error, rather than vulnerabilities in software and operating systems. Mistakes made by legitimate users are much less predictable, making them harder to identify and thwart than a malware-based intrusion. [HEADING=2]Social engineering attack techniques[/HEADING] Social engineering attacks come in many different forms and can be performed anywhere where human interaction is involved. The following are the five most common forms of digital social engineering assaults. [HEADING=3][B]Baiting[/B][/HEADING] As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a trap that steals their personal information or inflicts their systems with malware. The most reviled form of baiting uses physical media to disperse malware. For example, attackers leave the bait—typically malware-infected flash drives—in conspicuous areas where potential victims are certain to see them (e.g., bathrooms, elevators, the parking lot of a targeted company). The bait has an authentic look to it, such as a label presenting it as the company’s payroll list. Victims pick up the bait out of curiosity and insert it into a work or home computer, resulting in automatic malware installation on the system. Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of baiting consist of enticing ads that lead to malicious sites or that encourage users to download a malware-infected application. [HEADING=3][B]Scareware[/B][/HEADING] Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no real benefit (other than for the perpetrator) or is malware itself. Scareware is also referred to as deception software, rogue scanner software and fraudware. A common scareware example is the legitimate-looking popup banners appearing in your browser while surfing the web, displaying such text such as, “Your computer may be infected with harmful spyware programs.” It either offers to install the tool (often malware-infected) for you, or will direct you to a malicious site where your [URL='https://www.imperva.com/learn/application-security/cyber-security/']computer becomes infected[/URL]. Scareware is also distributed via spam email that doles out bogus warnings, or makes offers for users to buy worthless/harmful services. [HEADING=3][B]Pretexting[/B][/HEADING] Here an attacker obtains information through a series of cleverly crafted lies. The scam is often initiated by a perpetrator pretending to need sensitive information from a victim so as to perform a critical task. The attacker usually starts by establishing trust with their victim by impersonating co-workers, police, bank and tax officials, or other persons who have right-to-know authority. The pretexter asks questions that are ostensibly required to confirm the victim’s identity, through which they gather important personal data. All sorts of pertinent information and records is gathered using this scam, such as social security numbers, personal addresses and phone numbers, phone records, staff vacation dates, bank records and even security information related to a physical plant. [HEADING=3][B]Phishing[/B][/HEADING] As one of the most popular social engineering attack types, [URL='https://www.imperva.com/learn/application-security/phishing-attack-scam/']phishing[/URL] scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods them into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware. An example is an email sent to users of an online service that alerts them of a policy violation requiring immediate action on their part, such as a required password change. It includes a link to an illegitimate website—nearly identical in appearance to its legitimate version—prompting the unsuspecting user to enter their current credentials and new password. Upon form submittal the information is sent to the attacker. Given that identical, or near-identical, messages are sent to all users in phishing campaigns, detecting and blocking them are much easier for mail servers having access to [URL='https://www.imperva.com/learn/application-security/cyber-security-threats/']threat[/URL] sharing platforms. [HEADING=3][B]Spear phishing[/B][/HEADING] This is a more targeted version of the phishing scam whereby an attacker chooses specific individuals or enterprises. They then tailor their messages based on characteristics, job positions, and contacts belonging to their victims to make their attack less conspicuous. [URL='https://www.imperva.com/learn/application-security/spear-phishing/']Spear phishing[/URL] requires much more effort on behalf of the perpetrator and may take weeks and months to pull off. They’re much harder to detect and have better success rates if done skillfully. A spear phishing scenario might involve an attacker who, in impersonating an organization’s IT consultant, sends an email to one or more employees. It’s worded and signed exactly as the consultant normally does, thereby deceiving recipients into thinking it’s an authentic message. The message prompts recipients to change their password and provides them with a link that redirects them to a malicious page where the attacker now captures their credentials. [URL unfurl="true"]https://www.imperva.com/learn/application-security/social-engineering-attack/[/URL] [/QUOTE]
Insert quotes…
Verification
Post reply
Richest Naijafans User
Most NaijaCash
Naijafans
11,212 NaijaCash
Streetot
6,175 NaijaCash
N
NL SOFT
2,595 NaijaCash
maventechie
589 NaijaCash
SACHSTOSHI
578 NaijaCash
Naijablog
397 NaijaCash
Klaus
390 NaijaCash
Naijababe
272 NaijaCash
bestosteopathy1
205 NaijaCash
I
Irinaabada
130 NaijaCash
Home
Webmasters / Bloggers
social engineering and examples social engineering
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…