Previous Page  15 / 32 Next Page
Information
Show Menu
Previous Page 15 / 32 Next Page
Page Background

Phishing is the most popular type of social engineering activity.

It is a fraudulent attempt at acquiring a victim’s sensitive infor-

mation such as passwords, credit card details, etc. by pretend-

ing to be a legitimate and trusted company or institution in an

electronic message. In most cases, this attack can be launched

via email; however, it is also possible to get exposed through

chat applications, phone calls, social media or spoofed websites.

Spear phishing is basically the same as phishing, except that

it targets a specific victim or organization that is more likely to

be tricked into revealing confidential information. The attack-

er tries to use specific victim’s personal information to gain

trust and appear as a legitimate user. This information can

be gathered from online activities related to the victim, or his

social accounts. If the attack succeeds, the attacker will gain the

access and victim’s sensitive data will be compromised.

As its name sake, baiting involves luring a victim with some-

thing they desire. A good example is an infected flash drive with

inscriptions like “Confidential”, “My music” or the like. The victim

is enticed to take the flash drive and unknowingly install the

malware in his own device, thus giving access to the attacker.

Pretexting is, in essence, the practice of creating a plausible

enough scenario that makes a victim feel comfortable to reveal

confidential information, usually over the phone. Sometimes,

impersonation is also involved. The more credible the imper-

sonation or the scenario is, the more willing to provide sensitive

information the victim is.

»

»

Phishing

»

»

Spear Phishing

»

»

Baiting

»

»

Pretexting

July 2018

| 12

DoIT Newsletter

May 28, 2024