- Learn Penetration Testing
- Rishalin Pillay
- 354字
- 2021-06-24 14:09:21
Spear phishing
Spear phishing is a cyberattack that is targeted toward a specific individual, department, or company that appears to be from a trusted source. This type of attack is hard to spot and are well thought out, and often the targets are researched well in advanced before such an attack is performed. This is not like a normal phishing attack where the attackers cast a wide net; spear phishing is a directed attack.
The core component of a spear phishing attack is information gathering. Gathering information about email addresses, people, and their positions within the target organization (using OSINT tools such as LinkedIn) will help you define who your target will be and who you can impersonate. As we learned in Chapter 3, Performing Information Gathering, open source intelligence can provide you with a wealth of information on your targets.
Some common features of spear phishing attacks are as follows:
- Business email compromise (BEC): This aims to abuse processes such as payroll or invoices. The attack would leverage an email from a reputable source (within the from field) and contain a document related to an invoice. To the average human, nothing appears untoward and they would open that invoice and ultimately expose their system to the attack.
- Multi-vector threats: This attack uses multiple attack vectors. For example, the spear phishing email will contain dynamic URLs, drive-by downloads, and a payload encoded within a document to avoid detection.
- Virtually undetectable: Since a well-crafted spear phishing email does not have characteristics that are found within the large amounts of normal phishing emails that are found on the internet, it makes it harder to detect by traditional reputation and spam filters.
- Whaling: In this type of attack, a spear phishing campaign is directed at a high-profile target, often someone in the c-suite of an organization. High-profile people often have more privileged information than the average person, and this makes them a prime target. Any information that's stolen in a whaling attack is more lucrative on the black market, over and above the possibility of privileged credentials that an attacker can use.
- 揭秘卒中后非運(yùn)動(dòng)障礙:失眠 抑郁 認(rèn)知障礙
- 慢性胃炎百家百方
- 鼻咽癌標(biāo)準(zhǔn)數(shù)據(jù)集(2023版)
- 心理障礙的疏導(dǎo)自助
- 臨床心理學(xué)
- 中醫(yī)臨床技能實(shí)訓(xùn)教程
- 朱德生皮膚病學(xué)(第5版)
- 膜性概念神經(jīng)外科學(xué)
- 口腔微距攝影速成
- 神經(jīng)系統(tǒng)疾病的檢驗(yàn)診斷(第2版)
- Learning Geospatial Analysis with Python
- 乳腺癌患者自我管理手冊(cè)
- 冠心病介入處置爭(zhēng)鳴
- 非婦科脫落細(xì)胞學(xué)
- 神經(jīng)系統(tǒng)疾病與精神障礙