In Cybersecurity, reconnaissance refers to when an attacker interacts with a victim’s system in order to gain more information about a victim or their system.
Sometimes reconnaissance refers to when pen-testers are trying to gain more information about a system. While pen-testers have good intentions and are often employed by the company they’re performing reconnaissance on, they may act like attackers during this process.
During their social engineering attempts, attackers can often use spam, also known as unsolicited email, to target victims.
During their social engineering attempts, attackers can often use hoaxes, usually in the form of false security alerts, to target victims.
In Cybersecurity, prepending refers to when an attacker prepends, or attaches, a trustworthy value like “RE:” or “MAILSAFE: PASSED” to a message in order to make the message appear more trustworthy.
Values like that are usually automatically added by a user’s email client. This can make a user think their email client trusts the message and is safe to open.
In Cybersecurity, identity fraud refers to when an attacker uses a victim’s personal information, typically to impersonate the victim.
In Cybersecurity, pretexting refers to when an attacker tricks a victim by giving a false pretext, or reason, for why the victim should share information with the attacker.
In Cybersecurity, pharming refers to when an attacker redirects victims from a legitimate website to their malicious version. This is often done by making the name resolution process point to a different IP address.
A popular use of this is to harvest banking credentials from unsuspecting victims.
In Cybersecurity, typosquatting refers to when an attacker deliberately registers a website domain with a name that is extremely close to that of a legitimate website.
Attackers do this with the expectation that a user might accidentally interact with their website or content instead of that of the legitimate website.
The image shows some examples of how attackers might use “typos” to trick victims.
In Cybersecurity, credential harvesting refers to when an attacker attempts to harvest, or learn, a victim’s credentials.
Often, the attacker may just want to gain a large database of credentials rather than exploiting the user directly.
In Cybersecurity, a watering hole attack is when an attacker hacks a third-party service or software that a group of victims uses in order to gain access to a victim or the victim’s company’s services.
The third-party service is the “watering hole” that the group of victims are using, or “drinking” from.
Influence campaigns created by threat actors might use social media to push their narrative and affect public opinion. Bots and armies of posters (sometimes utilizing hacked accounts) may post messages that repeat or reinforce the hoaxes or false narrative pushed by influence campaigns.
In Cybersecurity, an influence campaign refers to a large-scale campaign launched by a threat actor, or group of threat actors, with a lot of power (like a hacktivist group, nation-state actor, or terrorist group) that seeks to shift public opinion.
It can be assumed that this shift is generally in bad faith or might seek to push a false narrative.
In Cybersecurity, hostile Influence campaigns can be utilized as a part of hybrid warfare.
Hybrid warfare is a type of warfare that uses conventional and unconventional means. To fit into the category of hybrid warfare, a campaign might use tactics like espionage, hacking, and spreading disinformation or fake news.
In social engineering, consensus, or social proof, refers to when a social engineer convinces victims they can be trusted.
They do this by pretending that others would have, or have already, trusted the threat actor (and their tools) and completed a request.
In social engineering, urgency, or scarcity, refers to when a social engineer creates a false sense or urgency in order to make a victim feel they must complete an action within a short time period.
In social engineering, authority, or intimidation, refers to when a social engineer attempts to intimidate a victim by trying to appear superior to the victim.
This is a high-risk strategy for an attacker and likely to be reported by a victim.
In social engineering, familiarity, or trust, refers to when a social engineer attempts to use charisma or likeability to get a victim to complete a request.
This is a low-risk strategy for an attacker and is unlikely to be reported by a victim.
Social engineering is a tactic in which a threat actor tricks a victim into sharing information or performing an action.
Principles used in social engineering include:
Phishing is a type of social engineering attack in which a threat actor, posing as a trustworthy source, attempts to trick a victim into doing something, either through email, webpages or even by phone.
How can a user spot phishing attacks? Look out for:
If something seems wrong, assume it is! Don’t be afraid to double-check and verify.
Phishing is a social engineering tactic that can be used for many things, such as stealing credentials or getting malware onto a system.
Some specialized types of phishing include: