Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
39
attack included financial losses for specific Twitter users, data exposure for a number of high-
profile accounts, and reputational damage to Twitter itself.
To understand potential prevention and mitigation, we need to understand how and why the
attack occurred. The attack began with phone spearphishing and social engineering, which
allowed attackers to obtain employee credentials and access to Twitter’s internal network. This
could have been prevented had employees been better equipped to recognize social engineering
and spearphishing attacks. Additional protections that could have prevented or mitigated this
attack include limiting access to sensitive internal tools using the principle of least privilege and
increased monitoring for anomalous user activity.
Phishing
: Phishing is a more general class of attack relative to spearphishing. While
spearphishing attacks are targeted to specific individuals, phishing is usually done in broad
sweeps. Phishing strategy is usually to try to send a malicious communication to as many people
as possible, inreasing the likelihood of a victim clicking a link or otherwise doing something that
would compromise security.
In September 2021, a subsidiary of Toyota acknowledged that they had fallen prey to a Business
Email Compromise
(BEC)
46
phishing scam. The scam resulted in a transfer of ¥ 4 billion (JPY),
equivalent to roughly 37 million USD, to the scammer’s account. This attack occurred because an
employee was persuaded to change account information associated with a series of payments.
The United States Federal Bureau of Investigation
(FBI)
47
recommends these and other steps be
taken to prevent BEC:
•
Verify the legitimacy of any request for payment, purchase or changes to account
information or payment policies in person.
•
If this is not possible, verify legitimacy over the phone.
•
Be wary of requests that indicate urgency.
•
Carefully inspect email addresses and URLs in email communications.
•
Do not open email attachments from people that you do not know.
•
Carefully inspect the email address of the sender before responding.
Ransomware
: Ransomware is a type of malware that infects computer systems and then locks a
legitimate user from accessing it properly. Often, users are contacted by the attacker and asked
for a ransom in order to unlock their machine or documents.
In May 2021, a ransomware
Yüklə
Dostları ilə paylaş: