Social Engineering Threats

Great Essays
Introduction
The purpose of this study is to explore social engineering tactics and why it is a viable attack vector. This study hopes to prove that social engineering is becoming a more prevalent danger in the corporate world. This is important because the security of corporations must be focused on to protect consumer data. If there is an attack vector that is not being protected against company data is in danger. This can lead to increased accounts of identity theft, credit card fraud, and stolen confidential information.
The study is trying to answer the research question, is social engineering becoming the one of the greatest dangers corporations are facing today? The hypothesis is that social engineering is becoming one of the greatest
…show more content…
The nature of a social engineering attack is hard to protect against because it exploits the “human factor” of the network. By manipulating end-users attackers are getting confidential information without the user even realizing it. Variety of social engineering attacks. One method of a social engineering attack, and one of the most popular, is phishing. Phishing is sending emails appearing to be from a reputable source with the intent of gaining personal information. Phishing accounts for “77% of all socially-based attacks” (Social-Engineer.Org, 2014). Phishing has become easier to execute thanks to the rise of the cybercrime market. Some attackers will solicit their phishing skills while other will sell phishing kits they created. The average kit costs between $2 to $10 which makes them easily accessible and are easy to use as will (Symantec, 2016, 33). The most common phishing attacks mimic banking institutions. While reports state that phishing numbers are declining over time, it does not mean that it is losing popularity. Phishing is evolving into a method coined “spear phishing”. (Symantec, 2016, …show more content…
In 2013, a record of a complex social engineering attack was published by Symantec. This record explains an attack on a French-based multinational company.
“In April 2013, the administrative assistant to a vice president at a French-based multinational company received an email referencing an invoice hosted on a popular file sharing service. A few minutes later, the same administrative assistant received a phone call from another vice president within the company, instructing her to examine and process the invoice. The vice president spoke with authority and used perfect French. However, the invoice was a fake and the vice president who called her was an attacker.” (Symantec, 2013)
The purpose of this attack was to install a remote access Trojan (RAT) onto the computer of the administrative assistant. This RAT was used to log keystrokes, view the desktop, and browse files. With this information they can claim passwords, screenshots of emails, and remotely download sensitive information without the assistant knowing what was going on. According to Symantec, this kind of attack is highly unusual, using both email and a phone call with perfect French. This complexity in an attack shows aggressive social engineering and how cybercrime and social engineering is

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Case Study John Brennan

    • 423 Words
    • 2 Pages

    1. Introduction Last year on October 12, Director of Central Intelligence of America (CIA) John Brennan’s American On-Line (AOL) e-mail account was hacked by a probable high school student. News of the incident was first reported by the New York Post after the teenager established communication with the newspaper the week before. Data breach activity took place against Brennan by the teenager who was social engineering to take control of Brennan’s AOL e-mail account. The hacker wasn’t working alone there were two other people helped him on the breach.…

    • 423 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Furthermore, Susan Bordo describes the marketing tactic of exploiting one’s vulnerabilities…

    • 1751 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Incredible Pre-Text

    • 790 Words
    • 4 Pages

    The most dangerous social engineers are those who can invent a lie so believable that they are able to successfully impersonate a legitimate employee without ever raising any suspicion. This tactic is particularly harmful because if real employees can be tricked into believing the criminal is actually a coworker or a member of upper management, it is not very difficult for a charismatic social engineer to manipulate the employee into divulging extremely sensitive information, or even worse, unwittingly grant the impersonator unfettered access to the network. As improbable as this technique seems, it is actually a favorite weapon in the social engineer's arsenal, and it has a frighteningly high rate of success!…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Social Media Data Analysis

    • 1277 Words
    • 5 Pages

    There have been incidents regarding privacy intrusion on social networking sites, leading to cyberbullying, dismissals, or even worse, suicides. Also, third-party partners are also criticized for ‘phishing, and other malicious purposes’ beside data mining, according to Debatin et al. (2009, p. 86). Cybercrime nowadays are often committed through means of social media, such as hacking, scams and frauds. This fact calls for higher concern in data…

    • 1277 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    In a research paper published by Png & Wang in 2007, using event study analysis found that computer crime is reduced by 36% in a 15-day window surrounding government enforcement against computer hacks. This shows that deterrence is a clear factor in an individual decided to commit a computer crime. This is due to the fact that there is much less obstacles needed to be deterred, and when an increase in deterrence is presented to the criminal, there is a direct relationship with the decrease in crime committee (Png & Wang, 11). Another empirical analysis conducted on computer crime found that within an hour of instant messaging with a non-stranger, harassment was 6% more likely to occur and an astounding increase of almost 80% chance of a non-stranger engaging in sexual harassment (783). Social control theory could explain this statistic, because the social norms of the situation are removed and the harasser does not have to does not have to confront the victim face to face.…

    • 562 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Today’s world is growing increasingly dependent on the use of digital media, broadening the horizons for possibility and innovation like never before. Look around; mobs of people everywhere are roaming their way through life, noses buried in their phones, eyes focused on their iPads and tablets. It is not complicated to perceive the apparent commonality among these individuals, being their growing obsession with divulging themselves in the addictive actions of digital media in a technologically advanced world. Digital media can take many forms, whether it be social media, like Instagram or Twitter, Facetime video chatting, or mild texting. Essentially, all of these sources are starting to both positively and negatively affect our culture as…

    • 1024 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Security Breaching

    • 1830 Words
    • 8 Pages

    Social Engineering is the least technical way of gaining personal or financial information. “Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software.” (Webroot.com). Hackers use simple methods like the ones mentioned prior to easily bypass tough network blocks or firewalls. It can be as simple as calling a company with a good pretext and questions, and ending the call with the network password, or the personal information of an executive that can be used to gain access to the full network.…

    • 1830 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays

Related Topics