Episode 3

Spearphishing

In this story we discover that the pitfalls can also arise from the receipt of a simple email, whose sender may not be what it seems at first sight. Surely you’ve ever received some “suspicious” emails, at work or at home: today we find out what the consequences and risks associated with this phenomenon can be, even in the real world.

The characters of the story

The story

vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta
vignetta

Glossary

Spearphishing
Social Engineering

Social Engineering, represents the technique used by an attacker (criminal) to gather information or circumvent physical and logical security checks. It has this name because it exploits human ties, habits, rules or procedures that keep society together, to change them to their own advantage.

Spearphishing
Phishing

Recalling the gesture of "fishing", it refers, in computer jargon, to the action carried out by criminals, falsifying electronic communications (email), to "bite" the target by causing them to click a link or enter personal credentials.

Spearphishing
Spear Phishing

Similar to Phishing, it tends to trap the unfortunate user who receives it, but in a targeted manner. Spear translates into "lance", and in fact the contents of Spear Phishing are launched towards the target in a targeted way, contain true information (collected for example thanks to Social Engineering), combined with false information, and induce the target to believe again more to the content of the email.

Spearphishing
Target

The name of the cyber attacks has this name. It is not necessarily a human being, it can be a "given" or a "system", but it represents the ultimate objective pursued by a criminal or malicious software.

Spearphishing
URL

Often called a web address, a URL is a sequence of characters that uniquely identifies the address of a website or any resource reachable from the internet, for example a video, an image, a document or an audio file. It is commonly used by typing it in the address bar of the browser or with other programs. The term URL is an acronym meaning "Uniform Resource Locator".

Today's lesson

Important

Does it seem incredible what you read? And yet this type of threat is very frequent and sometimes well masked, and a user’s error can have serious consequences for companies and public administrations.

What would have happened if the employee of our history had followed the link of the email, entered the fake site (completely resembling the Municipality’s management) and entered his login credentials? Mr. Malinitenzionati, the creator of everything, would have obtained the credentials of Francesco to access the management of the Municipality, and could thus have obtained all the sensitive data of the citizens. Sensitive data that could be of various nature (addresses, telephone numbers, perhaps the income situation) and that could be used for many unlawful purposes.   Finally, a note: Francesco had used or published his work email address on social networks, instead of using a personal address. A mistake that was going to cost him dearly!

What should I do?

tips