- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 330字
- 2021-06-30 19:15:59
Baiting
This preys upon the greed or curiosity of a certain target. It is one of the simplest social engineering techniques since all that it involves is an external storage device (1). An attacker will leave a malware-infected external storage device in a place where other people can easily find it. It could be in the washroom of an organization, in the elevator, at the reception desk, on the pavement, or even in the parking lot. Greedy or curious users in an organization will then retrieve the object and hurriedly plug it into their machines. Attackers are normally crafty and will leave files in the flash drive that a victim will be tempted to open. For example, a file labeled "the executive summary of salaries and upcoming promotions" is likely to get the attention of many.
If this does not work, an attacker might replicate the design of corporate thumb drives and then drop a few around the organization where they can be picked up by some of its staff. Eventually, they will end up being plugged into a computer and files will be opened. Attackers will have planted malware to infect the computers the flash drive is plugged into. Computers configured to auto-run devices once plugged in are in greater danger, since no user action is required to initiate the malware infection process.
In more serious cases, attackers might install rootkit viruses in the thumb drive that infect computers when they boot, while an infected secondary storage media is then connected to them. This will give attackers a higher level of access to the computer and the ability to move undetected. Baiting has a high success rate because it is human nature to either be greedy or curious and open and read files that are above their level of access. This is why attackers will choose to label storage media or files with tempting titles such as "confidential" or "executive" since internal employees are always interested in such things.
- 全屋互聯(lián):智能家居系統(tǒng)開發(fā)指南
- 操作系統(tǒng)實用教程(Linux版)
- 嵌入式Linux開發(fā)技術
- PLC控制程序精編108例
- Persistence in PHP with the Doctrine ORM
- 無蘋果不生活 OS X Mountain Lion隨身寶典
- 玩到極致 iPhone 4S完全攻略
- 混沌工程實戰(zhàn):手把手教你實現(xiàn)系統(tǒng)穩(wěn)定性
- Docker+Kubernetes應用開發(fā)與快速上云
- 8051軟核處理器設計實戰(zhàn)
- 巧學活用Windows 7
- Windows 7中文版從入門到精通(修訂版)
- Linux內核觀測技術BPF
- 計算機系統(tǒng):基于x86+Linux平臺
- 跟老男孩學Linux運維:Shell編程實戰(zhàn)