An overview of social engineering malware: Trends, tactics, and implications

被引:123
作者
Abraham, Sherly [1 ]
Chengalur-Smith, InduShobha [2 ]
机构
[1] SUNY Albany, Coll Comp & Informat, Albany, NY 12222 USA
[2] SUNY Albany, Sch Business, Albany, NY 12222 USA
关键词
Backdoors; Botnets; E-mail; Fast flux; Hijacking; Information security; Internet; Key loggers; Malware; Rootkits; SMTP engine; Social engineering; Social software; Whaling;
D O I
10.1016/j.techsoc.2010.07.001
中图分类号
D58 [社会生活与社会问题]; C913 [社会生活与社会问题];
学科分类号
摘要
Social engineering continues to be an increasing attack vector for the propagation of malicious programs. For this article, we collected data on malware incidents and highlighted the prevalence and longevity of social engineering malware. We developed a framework that shows the steps social engineering malware executes to be successful. To explain its pervasiveness and persistence, we discuss some common avenues through which such attacks occur. The attack vector is a combination of psychological and technical ploys, which includes luring a computer user to execute the malware, and combating any existing technical countermeasures. We describe some of the prevalent psychological ploys and technical countermeasures used by social engineering malware. We show how the techniques used by purveyors of such malware have evolved to circumvent existing countermeasures. The implications of our analyses lead us to emphasize (1) the importance for organizations to plan a comprehensive information security program, and (2) the shared social responsibility required to combat social engineering malware. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:183 / 196
页数:14
相关论文
共 50 条
  • [1] Adams A, 2005, USERS ARE NOT ENEMY
  • [2] Andress A, 2005, SURVIVING SECURITY I
  • [3] [Anonymous], 2002, ART DECEPTION CONTRO
  • [4] Brownlow M., 2008, E MAIL MARKETING REP
  • [5] Chien E, 2007, SYMANTEC THREATS RIS
  • [6] Computer Security Institute (CSI), 2008, COMP CRIM SEC SURV
  • [7] Culnan MJ, 2008, MIS Q EXEC, V7, P49
  • [8] Dang H., 2008, MCAFEE SECURITY J
  • [9] De la Paz R, 2009, TRENDLABS MALWARE BL
  • [10] Erbschloe M., 2004, TROJANS WORMS SPYWAR