EHEv1 Module 05 Social Engineering Techniques and Countermeasures
EHEv1 Module 05 Social Engineering Techniques and Countermeasures
EHEv1 Module 05 Social Engineering Techniques and Countermeasures
01 03
Discuss Social Discuss Insider Threats
Engineering Concepts and Identity Theft
and its Phases
04
02 Discuss Social Engineering
Discuss Social Countermeasures
Engineering Techniques
3 System Administrators
6 Senior Executives
1 2 3
Economic losses Damage of Loss of privacy
goodwill
4 5 6
Dangers of Lawsuits and Temporary or
terrorism arbitration permanent
closure
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Behaviors Vulnerable to Attacks
Authority Urgency
Scarcity Greed
3 4
Several organizational Lack of security
units policies
0
Security policies are as strong as their weakest link, and
1 human behavior is the most susceptible factor
0
It is difficult to detect social engineering attempts
2
0 There is no method that can be applied to ensure
complete security from social engineering attacks
3
There is no specific software or hardware to defend against
0 a social engineering attack
4
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Phases of a Social Engineering Attack
01 03
Discuss Social Discuss Insider Threats
Engineering Concepts and Identity Theft
and its Phases
04
02 Discuss Social Engineering
Discuss Social Countermeasures
Engineering Techniques
Impersonation (Vishing)
Vishing Example
Abusing the Over-Helpfulness of Help Desks
❑ The attacker calls a company’s help desk, pretends to be someone in a position of authority or relevance and tries to
extract sensitive information from the help desk
“A man calls a company’s help desk and says he has forgotten his password. He adds that if he misses the deadline on a
big advertising project, his boss might fire him.
The help desk worker feels sorry for him and quickly resets the password, unwittingly giving the attacker a clear entrance
into the corporate network.”
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Human-based Social Engineering
(Cont’d)
Piggybacking
❑ An authorized person intentionally or unintentionally allows an
unauthorized person to pass through a secure door e.g., “I forgot
my ID badge at home. Please help me”
Tailgating
❑ The attacker, wearing a fake ID badge, enters a secured area by
closely following an authorized person through a door that
requires key access
Spam Email
Irrelevant, unwanted, and unsolicited emails that attempt to
collect financial information, social security numbers, and
network information
Scareware
Malware that tricks computer users into visiting malware
infested websites, or downloading/buying potentially
malicious software
From: [email protected]
To: [email protected]
CC:
Subject: Tax Refund Notice !
Hi,
After the last annual calculations of your fiscal activity, we have
determined that you are eligible to receive a tax refund of $800. Please
submit the tax refund request and click here by having your tax refund
sent to your bank account in due time.
Please Click "Get Started" to have your tax refund sent to your bank
account, your tax refund will be sent to your bank account in due time
take your time to go through the bank we have on our list Clicking the link directs you to a
Get Started fraudulent web page that looks
Note: A refund can be delayed a variety of reasons, for example similar to a genuine HMRC page
submitting invalid records or applying after deadline.
Best Regards
HM Revenue & Customs
http://www.hmrc.gov.uk
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Computer-based Social Engineering: Phishing (Cont’d)
Examples of Phishing Emails
https://its.tntech.edu
Spear Phishing
1
A targeted phishing attack aimed at specific individuals within an organization
Whaling
2
An attacker targets high profile executives like CEOs, CFOs, politicians, and celebrities who
have complete access to confidential and highly valuable information
Pharming
3
The attacker redirects web traffic to a fraudulent website by installing a malicious program on
a personal computer or server
Spimming
4
A variant of spam that exploits Instant Messaging platforms to flood spam across the networks
PhishX
https://github.com
Modlishka
https://github.com
Trape
https://github.com
Evilginx
https://github.com
https://github.com
Attacker
publishes malicious
Creates malicious
mobile apps on
mobile application
app store
User
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Mobile-based Social Engineering:
Repackaging Legitimate Apps
Legitimate
Developer
01 03
Discuss Social Discuss Insider Threats
Engineering Concepts and Identity Theft
and its Phases
04
02 Discuss Social Engineering
Discuss Social Countermeasures
Engineering Techniques
Company’s Company
Disgruntled secret Internet Competitors
Employee
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Reasons for Insider Attacks
Negligent Insider
Insiders who are uneducated on potential security threats or who simply bypass
general security procedures to meet workplace efficiency
Professional Insider
Harmful insiders who use their technical knowledge to identify
weaknesses and vulnerabilities in the company’s network and sell
confidential information to competitors or black-market bidders
Compromised Insider
An insider with access to critical assets of an organization who is
compromised by an outside threat actor
Copyright © by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Why are Insider Attacks Effective?
01 03
Discuss Social Discuss Insider Threats
Engineering Concepts and Identity Theft
and its Phases
04
02 Discuss Social Engineering
Discuss Social Countermeasures
Engineering Techniques
https://www.netcraft.com https://www.phishtank.com
Gophish
https://getgophish.com
King Phisher
https://github.com
LUCY
https://www.lucysecurity.com
https://www.trustedsec.com
https://ohphish.eccouncil.org
The module discussed insider threats, including the various types of insider threats
In the next module, we will discuss in detail on various network level attacks and
countermeasures