- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 330字
- 2021-06-30 19:15:59
Baiting
This preys upon the greed or curiosity of a certain target. It is one of the simplest social engineering techniques since all that it involves is an external storage device (1). An attacker will leave a malware-infected external storage device in a place where other people can easily find it. It could be in the washroom of an organization, in the elevator, at the reception desk, on the pavement, or even in the parking lot. Greedy or curious users in an organization will then retrieve the object and hurriedly plug it into their machines. Attackers are normally crafty and will leave files in the flash drive that a victim will be tempted to open. For example, a file labeled "the executive summary of salaries and upcoming promotions" is likely to get the attention of many.
If this does not work, an attacker might replicate the design of corporate thumb drives and then drop a few around the organization where they can be picked up by some of its staff. Eventually, they will end up being plugged into a computer and files will be opened. Attackers will have planted malware to infect the computers the flash drive is plugged into. Computers configured to auto-run devices once plugged in are in greater danger, since no user action is required to initiate the malware infection process.
In more serious cases, attackers might install rootkit viruses in the thumb drive that infect computers when they boot, while an infected secondary storage media is then connected to them. This will give attackers a higher level of access to the computer and the ability to move undetected. Baiting has a high success rate because it is human nature to either be greedy or curious and open and read files that are above their level of access. This is why attackers will choose to label storage media or files with tempting titles such as "confidential" or "executive" since internal employees are always interested in such things.
- 全屋互聯:智能家居系統開發指南
- Linux設備驅動開發詳解:基于最新的Linux4.0內核
- Mastering vRealize Operations Manager(Second Edition)
- Learning Windows Server Containers
- Kali Linux滲透測試全流程詳解
- Linux操作系統應用編程
- 新手學電腦從入門到精通(Windows 10+Office 2016版)
- VMware NSX Cookbook
- OpenSolaris設備驅動原理與開發
- 從零開始學安裝與重裝系統
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)
- 辦公自動化教程(Windows7+Office2010)
- 電腦辦公(Windows 7+Office 2016)入門與提高
- 電腦辦公(Windows10+Office2016)從新手到高手
- Microsoft DirectAccess Best Practices and Troubleshooting