Answered 14 days AfterJan 16, 2021

Answer To: sa

Neha answered on Jan 30 2021
133 Votes
Spear-Phishing
The phishing can be defined as an attempt which can take the user to share their passwords or the login credentials which also can have their personal data or some sensitive data or they can install the malware, which is capable of granting the remote-control
access, spy on the device off user or steal some information from the system. The attacker will send any electronic message or the email which will pretend to be a trusted organization or the individual for the user and then they will request them to share information or download a file. If the user is responding with the information or he is downloading the file, then the security will be compromised. Generally, the attacker uses vague language, or the references and these attacks are highly tailored for the individuals who are getting targeted and hence the prior research needs to be effective. The traditional phishing attack can be used to monitor the sensitive information which is present in the device. Different types of phishing attacks generally rely on the social engineering, usage of the psychological manipulation which can trick people to reveal their personal or confidential information. The spear phishing tries to be more convincing for the users and hence they get success as compared with a generalised phishing attack. Spear phishing attack is generally connected with the advanced persistent threats, hidden monitoring for the organization or individual and consistent to have a purpose for getting access to the person information which can be further exploited.
Spear Phishing Attack in Ukraine
Recently the spear phishing attack took place in Ukraine the digital security lab. They shared to know table incidence which were done with the help of spear phishing. The first attack took place in November 2019 where an investigative journalist who was also the head of the organization was working with people of occupied Crimea and they became the target of the spear phishing campaign over Facebook. In the further investigation they also revealed that there was attempt of the advanced persistent threat instead of the general attack. In this specific case 2 individuals were involved who were recognised and report to the DSL. The second case took place in December 2019 in which 4 groups of the activist were targeted and they were sent the emails. By February 2020 the attack was continuing. In the first 2 weeks of the month 11 people received such phishing messages. After this the count increased to 15. A common adversity between the activist was local law enforcement but it was not possible to get clear Attribution of the attack which was based on the indicators of compromise like the IP addresses, emails or any other data.
Detecting...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here