首页> 外文会议>European Symposium on Research in Computer Security >Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces
【24h】

Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces

机译:大量的海上菲尔基:分析潜在的预攻击表面

获取原文

摘要

Advanced Persistent Threats (APTs) are one of the main challenges in modern computer security. They are planned and performed by well-funded, highly-trained and often state-based actors. The first step of such an attack is the reconnaissance of the target. In this phase, the adversary tries to gather as much intelligence on the victim as possible to prepare further actions. An essential part of this initial data collection phase is the identification of possible gateways to intrude the target.In this paper, we aim to analyze the data that threat actors can use to plan their attacks. To do so, we analyze in a first step 93 APT reports and find that most (80%) of them begin by sending phishing emails to their victims. Based on this analysis, we measure the extent of data openly available of 30 entities to understand if and how much data they leak that can potentially be used by an adversary to craft sophisticated spear phishing emails. We then use this data to quantify how many employees are potential targets for such attacks. We show that 83% of the analyzed entities leak several attributes of uses, which can all be used to craft sophisticated phishing emails.
机译:高级持久威胁(APTS)是现代计算机安全中的主要挑战之一。他们计划并由资助的高度训练有素,经过良好的培训和常规的行动者进行。这种攻击的第一步是目标的侦察。在这一阶段,对手试图尽可能多地在受害者那么多的智力,以准备进一步的行动。这个初始数据收集阶段的重要组成部分是识别可能的网关来侵入目标。在本文中,我们的目标是分析威胁演员可以使用来规划攻击的数据。为此,我们在第一个步骤93中分析APT报告,并通过向其受害者发送网络钓鱼电子邮件来开始它们的大多数(80%)。在此分析的基础上,我们衡量了30个实体的公开可用的数据程度,以了解他们泄漏的数据,这些数据可能会被对手潜在地用于制作复杂的矛网络钓鱼电子邮件。然后,我们使用此数据来量化许多员工是此类攻击的潜在目标。我们显示83%的分析实体泄露了几种使用属性,这都可以用于制作复杂的网络钓鱼电子邮件。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号