Professional Documents
Culture Documents
2020-1-EL01-KA203-079068
Cyber Warfare
Syndicate Work – Social Engineering
Panagiotis Karampelas
Hellenic Air Force Academy
Learning Objectives
Success
Advancing Relationship
Building Trust
Reconnaissance
Basic Steps of the Attack
Reconnaissance
• This step is common in all the
attacking tactics since it entails
the collection of information
about the victim organization
or individual.
• In the social engineering, there are several
interesting methods that are used by the attackers.
Basic Steps of the Attack
Building Trust
• The next step is to build trust with
the victim
• This is a very difficult process since it
entails
▪ personal communication with the
victim
▪ a very good pretext to start talking
about sensitive information such as
personal or professional information
• This is a rather complicated step and sometimes requires an
innate talent for the attacker to establish connection with
the victim without the victim suspecting something
Basic Steps of the Attack
Advancing Relationship
• Develop a closer relationship
with the victim
▪ by flattering the victim for a
quality that is appreciated
▪ then asking whether they could
collaborate again
• Similar to phishing
• Spear phishing is an email or electronic
communications scam targeted towards a specific
individual, organization or business
Phishing forms
l 1
ve
L e
Level two phishing
How can we recognize it?
l 2
ve
L e
Level three phishing
How can we recognize it?
l 3
ve
L e
Level four phishing (spear)
How can we recognize it? Most of the times we can’t
l 4
ve
L e
The anatomy of a phishing email
How to recognize a phishing email
mi n
15
Cyber Thursday
Warfare 3-Nov-2022
https://forms.gle/D9qdZpk3bN3tWBdG9
Questions?
References
The European Commission support for the production of this publication does not
constitute an endorsement of the contents which reflects the views only of the
authors, and the Commission cannot be held responsible for any use which may be
made of the information contained therein.