Spear Phishing Simulation in Critical Sector: Telecommunication and Defense Sub-sector

Ahmad Syukri Abdullah, M. Mohd
{"title":"Spear Phishing Simulation in Critical Sector: Telecommunication and Defense Sub-sector","authors":"Ahmad Syukri Abdullah, M. Mohd","doi":"10.1109/ICoCSec47621.2019.8970803","DOIUrl":null,"url":null,"abstract":"Phishing is an attack that uses social engineering techniques to steal users’ confidential information like passwords and banking information. It happens when cyber criminals disguised as a trusted entity and deceived users to click on fake links in e-mail received by the user. Cyber criminals also act to target phishing attacks from individuals to organizations that are specific to the country's critical sector, and this is known as a spear phishing. In fact, the telecommunication sector is one of the main targets of cyber criminals using spear phishing attacks to obtain user-sensitive information. The main objective of this work is to identify the level of cyber security in the organization under the telecommunication sector and defense sub-sector by using existing general simulation procedure. The procedure is adapted and modified according to the organization’s working environment. The first simulation was conducted on June 4, 2018 involving 39 employees. Findings showed that all respondents did not respond to the spear phishing e-mails received. In fact, the results of the questionnaire conducted after the end of the simulation found that all respondents were able to identify all indicators on spear phishing e-mails quickly and easily. This proves that the level of awareness and knowledge of cyber security of the population is high. The second simulation was conducted in stages, from October 29 to November 15, 2018 using a different approach. Of the 39 e-mails sent, 12 respondents (31%) responded to the received e-mail by clicking on the link in the e-mail content. Based on the results of this second simulation, this spear phishing attack was successfully implemented and proved that the new simulation procedure can be used in the telecommunication sector and defense sub-sector.","PeriodicalId":272402,"journal":{"name":"2019 International Conference on Cybersecurity (ICoCSec)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cybersecurity (ICoCSec)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoCSec47621.2019.8970803","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Phishing is an attack that uses social engineering techniques to steal users’ confidential information like passwords and banking information. It happens when cyber criminals disguised as a trusted entity and deceived users to click on fake links in e-mail received by the user. Cyber criminals also act to target phishing attacks from individuals to organizations that are specific to the country's critical sector, and this is known as a spear phishing. In fact, the telecommunication sector is one of the main targets of cyber criminals using spear phishing attacks to obtain user-sensitive information. The main objective of this work is to identify the level of cyber security in the organization under the telecommunication sector and defense sub-sector by using existing general simulation procedure. The procedure is adapted and modified according to the organization’s working environment. The first simulation was conducted on June 4, 2018 involving 39 employees. Findings showed that all respondents did not respond to the spear phishing e-mails received. In fact, the results of the questionnaire conducted after the end of the simulation found that all respondents were able to identify all indicators on spear phishing e-mails quickly and easily. This proves that the level of awareness and knowledge of cyber security of the population is high. The second simulation was conducted in stages, from October 29 to November 15, 2018 using a different approach. Of the 39 e-mails sent, 12 respondents (31%) responded to the received e-mail by clicking on the link in the e-mail content. Based on the results of this second simulation, this spear phishing attack was successfully implemented and proved that the new simulation procedure can be used in the telecommunication sector and defense sub-sector.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
关键部门的鱼叉式网络钓鱼模拟:电信和国防分部门
网络钓鱼是一种利用社会工程技术窃取用户密码和银行信息等机密信息的攻击。网络犯罪分子伪装成受信任的实体,欺骗用户点击用户收到的电子邮件中的虚假链接。网络犯罪分子还针对针对国家关键部门的个人对组织的网络钓鱼攻击采取行动,这被称为鱼叉式网络钓鱼。事实上,电信行业是网络罪犯利用鱼叉式网络钓鱼攻击获取用户敏感信息的主要目标之一。这项工作的主要目标是通过使用现有的通用模拟程序,确定电信部门和国防子部门下组织的网络安全水平。该程序应根据组织的工作环境进行调整和修改。第一次模拟于2018年6月4日进行,涉及39名员工。调查结果显示,所有受访者都没有回复收到的鱼叉式网络钓鱼邮件。事实上,在模拟结束后进行的问卷调查结果发现,所有受访者都能够快速轻松地识别出鱼叉式网络钓鱼电子邮件的所有指标。这证明了人们对网络安全的意识和知识水平是很高的。第二次模拟于2018年10月29日至11月15日分阶段进行,使用了不同的方法。在发出的39封电子邮件中,有12名受访者(31%)通过点击电子邮件内容中的链接对收到的电子邮件作出回应。基于第二次仿真的结果,成功实施了鱼叉式网络钓鱼攻击,并证明了该仿真程序可用于电信行业和国防子行业。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Instrumenting API Hooking for a Realtime Dynamic Analysis Mobile Malware Classification for Social Media Application TAGraph: Knowledge Graph of Threat Actor Feature Extraction and Selection Method of Cyber-Attack and Threat Profiling in Cybersecurity Audit ICoCSec 2019 Author Index
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1