Pages

Monday, November 7, 2022

Network Security | Ping, Phishing (Fishing) And Social Engineering

Image courtesy of Network Security Wallpapers

It is proven time and time again that nothing in this world is exempt from the exploitation of people looking for self-gratification. Just as the world moves forward on its path toward technological discovery and expansion, so too does the knowledge and evolution of those that seek to use these technologies for ill purposes. These individuals intend to infiltrate systems to acquire users’ personal information such as names, birth dates, social security numbers, addresses, bank card numbers, account numbers, etc.

Since cybercriminals steal a user’s information to use it for themselves or someone else other than the individual it belongs to, cyber-attacks are also a method of Identity Theft.

The Dark Side of Ping

In a previous post, we discussed the purpose of using ping and traceroute commands. Ping commands are usually used to determine a server or computer’s connectivity by sending packets to an IP address and measuring the time it takes to receive a response. However, ping commands can also be used as a type of cyber-attack. One such attack that the ping command can be used to initiate is an ICMP flood attack, otherwise known as a ping flood attack. “Ping flood is a common Denial of Service (DoS) attack in which an attacker takes down the victim’s computer by overwhelming it with ICMP echo requests, also known as pings.” (Ping flood (ICMP flood), n.d.) Essentially, this overloads the receiver’s network with data packets, which puts a strain on said network. Here are several types of attacks that can be performed:

A targeted local disclosed attack targets a single computer on a local network. A router-disclosed attack targets routers to disrupt communications between computers on a network. And lastly, a blind ping flood attack involves using an external program to uncover the IP address of the target before executing an attack. A successful attack will either take down the targeted computer or computers connected to a router in each type of attack. (Ping flood (ICMP flood), n.d.)

Cybercrime: Phishing (Fishing) And Social Engineering

Moving on, ping attacks are just one method of computer incident that cybercriminals use to attack or steal/acquire information from targets online. The two other computer incidents I elected to cover for this assignment are phishing (fishing) and social engineering. I was already pretty well versed in what phishing was as it has been on the rise in recent years. Many employers, including my own, have been proactive about warning their employees about the dangers of phishing emails.

According to research, “Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, bank accounts, credit card details, and passwords.” (What Is Phishing?, n.d.) Social engineering can be defined as methods employed by hackers to gain the trust of an end user so that the hacker can obtain information that can be used to access data or systems. (What Is Social Engineering? The Human Element in the Technology Scam, n.d.)


Image courtesy of Mike Chu of Data Overhaulers

When Cybercriminals Attack

In researching, I discovered that there is not much difference between phishing and social engineering. Instead, social engineering is a general umbrella term that is used to describe types of attacks cybercriminals use to access your computer or steal your information, and phishing is a type of social engineering attack. For phishing to be successful, the attacker has to convince their target that they are a trusted representative for an institution or business. In doing so, the attacker will try to trick their target into clicking on the malicious email or text links that would corrupt their computer with malware or send them to an illegitimate website designed to impersonate a legitimate website. The malware attack will infect a user’s system and may render their computer unusable or susceptible to data breaches.

Regarding phony websites, the attacker tricks their target into inputting personal information that the attacker would then use for their nefarious purposes. Also, as a type of social engineering, attackers can acquire phone number information for individuals they want to target. They will call you on the phone while impersonating an institution representative to trick you into giving them personal information. Sometimes they want you to confirm your username and password for websites you access, or they may want to confirm your payment information. They may even offer you a free trip or assistance of some type that requires over-the-phone payment to secure their services.

The Outcome and How to Combat Cybercriminals

If an attacker is successful at tricking their target into believing they are a legit representative, it opens the door for them to acquire personal information such as passwords and bank account or card number information. That said, there are ways to prevent these reprehensible individuals from gaining access to your computer, accounts, and other affairs. According to ComptTIA.org (n.d.), you should:

  • Research any suspicious calls, emails, or texts.
  • Open attachments only from trusted sources.
  • Immediately delete any emails or texts asking for passwords or personally identifiable information (PII), such as social security numbers or financial information.
  • Don’t open any emails promising prizes or notifications of winnings.
  • Download software only from approved sources.
  • Be wary of urgent requests or solicitations for help.
  • Make sure you have spam filters and antivirus software on your device.
  • When in doubt, contact IT to confirm any technology-related requests.

References:

  1. Ping flood (ICMP flood). (n.d.). Imperva. https://www.imperva.com/learn/ddos/ping-icmp-flood/
  2. What Is Phishing? (n.d.). Phishing. https://www.phishing.org/what-is-phishing
  3. What Is Social Engineering? The Human Element in the Technology Scam. (n.d.). CompTIA. https://www.comptia.org/content/articles/what-is-social-engineering

 

No comments:

Post a Comment