Discover and Automate New Adversarial Attack Paths to Reduce Threat Risks for The Security of Organizations

Azhar Ghafoor, M. A. Shah, Bilal Zaka, Muhammad Nawaz
{"title":"Discover and Automate New Adversarial Attack Paths to Reduce Threat Risks for The Security of Organizations","authors":"Azhar Ghafoor, M. A. Shah, Bilal Zaka, Muhammad Nawaz","doi":"10.58245/ipsi.tir.2402.06","DOIUrl":null,"url":null,"abstract":"Phishing remains a pervasive cybersecurity threat, leveraging social engineering and technological deception to obtain sensitive information and credentials. This research explores novel attack paths employed by sophisticated adversaries, focusing on the identification and analysis of emerging tactics to enhance understanding and awareness of evolving phishing threats. The study uncovers various attack vectors, including the impersonation of reputable entities and the exploitation of legitimate platforms for malicious purposes. Notably, it highlights the increasing prevalence of documentbased and social media-based phishing campaigns, underscoring the adaptability of attackers in exploiting diverse channels to deceive users. Furthermore, the research evaluates the effectiveness of current countermeasures and proposes actionable strategies to mitigate phishing risks for organizations. Recommendations include strengthening email protection measures, implementing robust web filtering systems, and conducting simulated phishing campaigns to enhance employee awareness. By providing insights into emerging attack paths and practical recommendations, this research contributes to the ongoing efforts to combat phishing threats and strengthen cybersecurity resilience. The findings underscore the critical importance of proactive measures and continuous vigilance in safeguarding against evolving cyber threats in today's dynamic digital landscape.","PeriodicalId":516644,"journal":{"name":"IPSI Transactions on Internet Research","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IPSI Transactions on Internet Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58245/ipsi.tir.2402.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Phishing remains a pervasive cybersecurity threat, leveraging social engineering and technological deception to obtain sensitive information and credentials. This research explores novel attack paths employed by sophisticated adversaries, focusing on the identification and analysis of emerging tactics to enhance understanding and awareness of evolving phishing threats. The study uncovers various attack vectors, including the impersonation of reputable entities and the exploitation of legitimate platforms for malicious purposes. Notably, it highlights the increasing prevalence of documentbased and social media-based phishing campaigns, underscoring the adaptability of attackers in exploiting diverse channels to deceive users. Furthermore, the research evaluates the effectiveness of current countermeasures and proposes actionable strategies to mitigate phishing risks for organizations. Recommendations include strengthening email protection measures, implementing robust web filtering systems, and conducting simulated phishing campaigns to enhance employee awareness. By providing insights into emerging attack paths and practical recommendations, this research contributes to the ongoing efforts to combat phishing threats and strengthen cybersecurity resilience. The findings underscore the critical importance of proactive measures and continuous vigilance in safeguarding against evolving cyber threats in today's dynamic digital landscape.
发现并自动化新的对抗性攻击路径,降低威胁风险,保障组织安全
网络钓鱼仍然是一种普遍存在的网络安全威胁,它利用社会工程学和技术欺骗来获取敏感信息和凭证。本研究探讨了老练的对手所采用的新型攻击路径,重点是识别和分析新出现的策略,以加强对不断演变的网络钓鱼威胁的理解和认识。研究发现了各种攻击载体,包括假冒知名实体和利用合法平台达到恶意目的。值得注意的是,它强调了基于文档和社交媒体的网络钓鱼活动日益普遍,突出了攻击者利用不同渠道欺骗用户的适应性。此外,研究还评估了当前应对措施的有效性,并提出了可操作的策略,以降低企业的网络钓鱼风险。建议包括加强电子邮件保护措施、实施强大的网络过滤系统,以及开展模拟网络钓鱼活动以提高员工的防范意识。通过深入了解新出现的攻击路径并提出实用建议,本研究为打击网络钓鱼威胁和加强网络安全恢复能力的持续努力做出了贡献。研究结果强调,在当今动态的数字环境中,采取积极主动的措施并保持持续警惕,对于防范不断演变的网络威胁至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信