IL-midterm - en Sreynich - G3
IL-midterm - en Sreynich - G3
Assignment
Teach by: Mr. Van Khema
TA: Mrs. Say Sophea
Created by: Mrs. En Sreynich
IDTB100147
Group: 03
BEC attacks can be among the costliest cyberattacks, with scammers often
stealing millions of dollars at a time. In one notable example, a group of
scammers stole more than USD 100 million from Facebook and Google by
posing as a legitimate software vendor. Some BEC scammers are shifting
away from these high-profile tactics in favor of launching small attacks
against more targets. According to the Anti-Phishing Working Group
(APWG), BEC attacks grew more frequent in 2023, but scammers asked
for less money on average with each attack.
Let's talk about pretexting, which is a technique that finds its way into many
kinds of cyberattacks. Like any other type of social engineering, the
perpetrator’s goal is to convince their victim to give them something—
generally information, access, or money—under false pretenses. They do
this by creating a believable story, often including characters and specific
details like private information, that plays on the victim’s emotions, sense of
trust, or even fears.
Take the classic “Nigerian Prince” scam as an example. A simple pretext
by today’s standards hinges on the promise of giving a little now for a large
return later, whether the pretext is a locked bank account, a financial
venture, or whatever other explanation. A prince emailing strangers for help
might sound too far-fetched to be effective, but in 2019, electronic security
company ADT estimated Nigerian Prince schemes were still pulling in
$700,000 every year.
Pretexting is the groundwork for these scams, luring people into making
security mistakes and creating the opening for the next stage of the attack.
That can lead to substantial personal or financial damage to the victims.
Thus, it’s important to be alert and skeptical of these tactics, and to
remember that when someone asks for access to your accounts or
information, it’s okay to question them and verify their identity before
complying with the request.
Quid pro quo is a form of social engineering where the attacker offers
something to their victim in exchange for information, access, or action.
The pretext might be, for example, an IT support technician offering free
assistance to employees with their computers. By pretending to help them
with their technical problems, the attacker gets access to the employees'
computers and any sensitive data on them.
Phishing capitalizes on our inclination to trust familiar sources and react swiftly
under pressure, often by impersonating reputable entities or fabricating urgent
situations. This approach not only jeopardizes personal security but also poses
significant financial and data integrity risks to businesses annually. Conversely,
pretexting relies on creating convincing scenarios to extract sensitive information
or influence actions, leveraging personal details and emotional appeals to achieve
its objectives.