An open API service indexing awesome lists of open source software.

https://github.com/qeeqbox/social-engineering-methods


https://github.com/qeeqbox/social-engineering-methods

Last synced: 3 months ago
JSON representation

Awesome Lists containing this project

README

        

### Social Engineering

When a threat actor psychologically manipulates (tricks) someone into revealing private or valuable information. The threat actor starts by selecting the target, engaging with them based on some principles, getting the data, and covering their track. Different types of social engineering attacks include Phishing, Smishing, Vishing, Spam, Spear Phishing, Dumpster diving, Shoulder surfing, Pharming, Tailgating, and Whaling.

* * *

### Principles

* Authority: claiming a person in a leadership role (This one is common).
* Intimidation: claiming if an action is not taken, it will be escalated to a supervisor or a director.
* Consensus: claiming an action is normal and others are doing that action.
* Scarcity: claiming there is a limited quantity.
* Familiarity, introducing something that's the target already familiar with.
* Urgency, claiming an action is needed now; otherwise, it won't work.

* * *

### Phishing

When a threat actor targets anyone with an email that tricks the user into performing a specific action.

#### Example

* An email that has a link to a fake PayPal link.

* * *

### Spear Phishing

When a threat actor targets a specific individual, group, or organization with an email that tricks the user into performing a particular action.

#### Example

* A threat actor finds out that a business uses PayPal for transactions, then crafts a personalized email with a fake PayPal link and sends it to that business.

* * *

### Whaling

Similar to Spearphing but targeting the C-Suite level (CEO, CSO, CIO, etc..).

#### Example

* A threat actor targets XYZ LLC CEO with a personalized email containing a malicious link to a fake XYZ link.

* * *

### Smishing

Similar to Spearphishing but carried out over mobile text messaging.

#### Example

* A threat actor targets XYZ LLC users with an Android phone with a personalized SMS that includes a malicious pdf file containing an Android exploit.

* * *

### Vishing

Similar to Phishing but carried out over phone calls.

#### Example

* A threat actor pretends to be an internal IT Helpdesk from XYZ LLC, then calls the XYZ CEO and asks for the VPN information

* * *

### Spam

Unsolicited emails sent in bulk by humans or a botnet (Mostly botnets). Sometimes the intention of Spam is not malicious but rather commercial.

#### Example

* An infected system (Part of a botnet) sends bulk emails that contain a link to a new product (The intent is to advertise that product).

* * *

### Dumpster diving

When a threat actor searches your trash for private or valuable information (Getting information from discarded items).

#### Example

* A threat actor searches XYZ LLC trashes for information; the threat actor finds an unencrypted hard drive that XYZ failed to dispose of properly.

* * *

### Shoulder Surfing

When a threat actor for information by looking over someone's shoulder.

#### Example

* A threat actor is watching someone entering their username and password of a banking app at a coffee shop.

* * *

### Pharming

When a threat actor creates a fake website that looks legitimate and then directs users to it, usually, the threat actor installs or uses a malicious code that directs the users); this specific cyberattack is a little more complicated than Phishing because it may need DNS hijacking, spoofing, or cache poisoning.

#### Example

* A threat actor crafts a malicious exploit that poison the local DNS cache of a system, and the victim gets redirected to a fake backing website instead of the actual website.

* * *

### Tailgating

When a threat actor follows an authorized to a restricted area without consent from the authorized person.

#### Example

* A threat actor follows an HR specialist to the HR section

* * *

### Piggybacking

When a threat actor follows an authorized to a restricted area with consent from the authorized person.

#### Example

* A threat actor follows an HR specialist, stops the person, and asks about the weather. Then, the threat actor pretends that they left their keys at home. The HR specialist let the threat actor inside the restricted section