TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

How to Perform and Combat Social Engineering

BHIS · 2024-08-23 · Read original ↗

ATT&CK techniques detected

3 predictions
T1566Phishing
45%
"how to perform and combat social engineering how to perform and combat social engineering this article was originally published in the second edition of the infosec survival guide. find it free online here or order your $ 1 physical copy on the spearphish general store. social en…"
T1566.002Spearphishing Link
41%
"asked to download software or navigate to a web application? - is it too good to be true? - are they being asked for their password, date of birth, last four of their social, or other sensitive information? if you think that you are a target of a social engineering attempt, conta…"
T1621Multi-Factor Authentication Request Generation
36%
"an it person calling to discuss a problem with an update that wasn ’ t pushed correctly, or a computer that isn ’ t calling home appropriately. recently, a tester posed as hr calling to ensure that employees have had their yearly review. before continuing with the call, the “ hr …"

Summary

This article was originally published in the second edition of the InfoSec Survival Guide. Find it free online HERE or order your $1 physical copy on the Spearphish General Store. […]

The post How to Perform and Combat Social Engineering appeared first on Black Hills Information Security, Inc..