Blog|Login|中文Deutsche日本語
September 07, 2012
 The Quantum Mechanics of Spear Phishing
Pin It

One of problems we see in the last couple of years, has a direct connection to the rise of social networking. Social networks such as Facebook, LinkedIn and others, may hide our most valuable personal information, but it exposes some.

A Spear Phishing attack is an attack where the hacker  targets a specific identity within an organization in order to either steal information directly from this entity, or use it as a springboard into the corporate network.

If a hacker wishes to gain access to a database within an organization, the best way to do so will be to gain access to a DBA’s computer. Why?  This job role will have almost unlimited access to corporate data.

The Social Connection

In the information age, anyone who’s anyone , and wishes to advance and improve his Career and business network, uses some sort of a social network online to show “I exist.”  However it introduces some serious risks.

Social networks such as LinkedIn allow very simple search by head hunters, HR or sales organizations in order to target specific individuals for employment. With the industrialization of hacking, what is the hackers view?

How?

A Hacker that whishes to SpearPhish a DBA at a company may find that identifying the targets have become a lot easier. All you really have to do is use a tool like LinkedIn’s Advanced Search and look for “DBA” as current job, and “<put-company-name-here>” as current company, maybe add the industry – and you’re done . LinkedIn will do the job for you:

Sp1

Search results will show us exactly who to target.

Sp2

What can individuals and companies do to protect themselves?

  1. Don’t accept ALL invites you receive in your social network. Not everyone is trying to hire you or make business with you, some just want to get your contact info after they target you so they can send the phishing emails etc.
  2. Treat Social Network messages like you do with your Emails. Check who is it from and understand context before you choose to reply.
  3. Make sure that in your social networks profiles, you are not sharing your contact information, unless you explicitly approve them.
  4. As an organization, have the tools to protect your employees from such scams, and a policy in place.
  5. Education:  train employees and raise the levels of awareness.
  6. Assume you've been compromised.  For more, read this.

Comments

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Working...
Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.

Working...

Post a comment

Comments are moderated, and will not appear until the author has approved them.

« Assad's Password? 1234 | Main | Managing Java Vulnerabilities »

Find Us Online
RSS Feed - Subscribe Twitter Facebook iTunes LinkedIn YouTube
Authors
Monthly Archives
Email Subscription
Sign up here to receive our blog: