Social Engineering Attacks on Government Opponents: Target Perspectives

نویسندگان

  • William R. Marczak
  • Vern Paxson
چکیده

New methods of dissident surveillance employed by repressive nation-states increasingly involve socially engineering targets into unwitting cooperation (e.g., by convincing them to open a malicious attachment or link). While a fair amount is understood about the nature of these threat actors and the types of tools they use, there is comparatively little understood about targets’ perceptions of the risks associated with their online activity, and their security posture. We conducted in-depth interviews of 30 potential targets of Middle Eastern and Horn of Africa-based governments, also examining settings and software on their computers and phones. Our engagement illuminates the ways that likely targets are vulnerable to the types of social engineering employed by nationstates.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building accurate HAV exploiting User Profiling and Sentiment Analysis

Social Engineering (SE) is one of the most dangerous aspect an attacker can use against a given entity (private citizen, industry, government, ...). In order to perform SE attacks, it is necessary to collect as much information as possible about the target (or victim(s)). The aim of this paper is to report the details of an activity which took to the development of an automatic tool that extrac...

متن کامل

(Poster) Sonar Phishing: Pinpointing Highly Vulnerable Victims for Social Engineering Attacks

Targeted social engineering attacks use personal information about an individual to create compelling behavioural hooks which draw the target to interact with a malicious payload or give out valuable information, more successfully than unsophisticated generic attacks [1]. Such attacks can hijack trust by pretending to be friends or trusted authorities [2], or can leverage a user’s personal inte...

متن کامل

Panning for Gold: Automatically Analysing Social Engineering Attack Surfaces

The process of social engineering targets people rather than IT infrastructure. Attackers use deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a target to disclose sensitive information or to interact with a malicious payload. The creation of such hooks requires background information on targets. Individuals are increasingly releasing information about the...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

A history of gastric secretion and digestion: experimental studies to 1975

from the sacred uses of tobacco in South America, through its introduction for medical and recreational use into Europe and other parts of the world, to the history of the tobacco trade and its opponents. Where previous histories of tobacco have been either specialized or anecdotal, Goodman endeavours to be both general and precise. Tobacco's history has been studied from many perspectives, ran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • PoPETs

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017