Social Engineering in a Post-Phishing Era: Ambient Tactical Deception Attacks

08/30/2019
by   Filipo Sharevski, et al.
0

It is an ordinary day working from home, and you are part of a team that regularly interacts over email. Since this is your main line of communication, the company trained you to spot phishing emails. You've learned to skip over emails that exhibit obvious phishing red flags: suspicious links, attachments, grammar errors, etc. You just received an email from your boss about a major project on which you play a critical role. The email is more demanding than usual, even impolite. Your boss has generally seemed more upset with you lately, so you approach them to express your concerns and clear the air. Your boss is not receptive to your feedback. This causes a rift that impacts your working relationship, compromising the effectiveness and productivity of the entire team. You have been a victim of an Ambient Tactical Deception (ATD) attack. We developed and tested a proof-of-concept social engineering attack targeting web-based email users. The attack is executed through a malicious browser extension that acts as a man-in-the-middle and reformats the textual content to alter the emotional tone of the email. The objective of ATD is not stealing credentials or data. ATD seeks to coerce a user to the attacker's desired behavior via the subtle manipulation of trusted interpersonal relationships. This goes beyond simple phishing and this paper reports the findings from study that investigated an ATD attack on the politeness strategy used in work emails.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/09/2022

Impacts and Integration of Remote-First Working Environments

Due to the Covid-19 pandemic in 2020 or other business decisions, remote...
research
10/25/2018

Sorry: Ambient Tactical Deception Via Malware-Based Social Engineering

In this paper we argue, drawing from the perspectives of cybersecurity a...
research
06/30/2021

Leveraging Team Dynamics to Predict Open-source Software Projects' Susceptibility to Social Engineering Attacks

Open-source software (OSS) is a critical part of the software supply cha...
research
01/03/2019

Draining the Water Hole: Mitigating Social Engineering Attacks

Cyber adversaries have increasingly leveraged social engineering attacks...
research
07/23/2020

Bot Development for Social Engineering Attacks on Twitter

A series of bots performing simulated social engineering attacks using p...
research
08/17/2023

RatGPT: Turning online LLMs into Proxies for Malware Attacks

The evolution of Generative AI and the capabilities of the newly release...

Please sign up or login with your details

Forgot password? Click here to reset