• Title/Summary/Keyword: 사회공학공격

Search Result 68, Processing Time 0.024 seconds

A Study on the Penetration and Information Collection Method using Social Engineering and Malicious Code (사회공학과 악성코드를 이용한 단말침투 및 정보수집 방법에 대한 연구)

  • Lee, Hyunwoo;Yooun, Hosang;Shin, Dongil;Shin, Dongkyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.220-222
    • /
    • 2017
  • 제 4차 산업이 다가오는 이 시점에서 보안이 잘 갖추어진 네트워크 조직에서도 사람과 PC와 같은 단말에 대한 취약점이 드러나면 결국 네트워크 전체가 무너질 수 있다. 그러므로 단말에 대한 보안이 중요시되고 있다. 암호화된 장비를 갖추거나 물리적 망 분리를 한다하여도 사회공학을 통한 보안 위협은 여전히 존재하고 있기 때문이다. 본 논문에서는 사회공학을 통해 사람과 PC와 같은 단말을 통해 침투하고 악성코드를 유포하여 공격 대상의 정보를 수집하는 방법에 대하여 연구한다.

Developing a Trojan Horse Application for Smartphone Data Hacking using Bluetooth (블루투스를 이용한 스마트폰 데이터 해킹 트로이목마 어플리케이션 개발)

  • Heo, June;Wee, Donghyun;Lee, Seongwon;Cho, Teanam
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.470-473
    • /
    • 2018
  • 본 논문에서는 스마트폰과 스마트폰이 블루투스로 연결할 때 페어링 진행을 최초 1회만 하는 것에 대한 위험성에 관하여 연구하였다. 본 연구를 통하여 구현한 트로이목마 어플리케이션은 희생자 스마트폰과 페어링이 되어 있을 경우, 실행과 동시에 공격자의 스마트폰과 블루투스로 연결되도록 하였다. 희생자 스마트폰의 어플리케이션은 스마트폰의 카메라를 작동시켜 사진을 촬영하고 스마트폰에 저장된 주소록 데이터를 추출하며, 촬영한 사진과 추출한 주소록 데이터를 공격자의 스마트폰으로 전송한다. 공격자는 희생자의 스마트폰에서 탈취한 정보를 확인할 수 있다.

  • PDF

1.25 인터넷 침해사고의 분석과 대책

  • Seo, Dong Il;Lee, Sang Ho
    • The Magazine of the IEIE
    • /
    • v.30 no.6
    • /
    • pp.49-49
    • /
    • 2003
  • 최근 정보화가 고도화되면서, 우리의 경제·사회 활동 기반구조는 인터넷과 같은 정보통신인프라에 절대적으로 의존하고 있어 사이버 안전이 확보되지 않은 정보사회는 어떤 재난보다 치명적인 위험에 직면할 가능성이 점점 더 커지고 있는 상황이다. 최근 발생되었던 1.25인터넷 침해사고는 그러한 위험에 대한 극적인 실례를 보여준 것이라 할 것이다. 따라서, 본 기고문에서는 지난 1.25 인터넷 침해사고의 원인을 분석하여 보고, 향후 이러한 공격에 대한 대응 방안을 개인적 측면, 제도 정책적 측면, 기술적 측면에서 살펴보고자 한다.

1.25 인터넷 침해사고의 분석과 대책

  • 서동일;이상호
    • The Magazine of the IEIE
    • /
    • v.30 no.6
    • /
    • pp.615-623
    • /
    • 2003
  • 최근 정보화가 고도화되면서, 우리의 경제·사회 활동 기반구조는 인터넷과 같은 정보통신인프라에 절대적으로 의존하고 있어 사이버 안전이 확보되지 않은 정보사회는 어떤 재난보다 치명적인 위험에 직면할 가능성이 점점 더 커지고 있는 상황이다. 최근 발생되었던 1.25인터넷 침해사고는 그러한 위험에 대한 극적인 실례를 보여준 것이라 할 것이다. 따라서, 본 기고문에서는 지난 1.25 인터넷 침해사고의 원인을 분석하여 보고, 향후 이러한 공격에 대한 대응 방안을 개인적 측면, 제도·정책적 측면, 기술적 측면에서 살펴보고자 한다.

  • PDF

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

Real-time Responses Scheme to Protect a Computer from Offline Surrogate Users and Hackers (오프라인 대리사용자 및 해커로부터 특정 컴퓨터 보호를 위한 실시간 대응방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2019
  • One of the causes of many damage cases that occur today by hacking attack is social engineering attack. The attacker is usually a malicious traitor or an ignorant insider. As a solution, we are strengthening security training for all employees in the organization. Nevertheless, there are frequent situations in which computers are shared. In this case, the person in charge of the computer has difficulty in tracking and responding when a specific representative accessed and what a specific representative did. In this paper, we propose the method that the person in charge of the computer tracks in real time through the smartphone when a representative access the computer, when a representative access offline using hacked or shared authentication. Also, we propose a method to prevent the leakage of important information by encrypting and backing up important files of the PC through the smartphone in case of abnormal access.

Improvement Plan for Public Institution Remote Security Model in the New-Normal Era (뉴노멀 시대의 공공기관 원격보안 모델 개선방안)

  • Shin, SeungWoo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.104-112
    • /
    • 2022
  • The pandemic caused by the COVID-19 virus, which has lasted for the past three years, has changed society and the way people live in many ways. These changes also affect cyberspace, so the pre-pandemic information security model and standards have limitations when applied to the current situation. In this paper, a new method to improve the information security model of public institutions was proposed in consideration of various situations in the new normal era. In other words, through the proposed information security model, the possibility of external intrusion is blocked in advance through the policy and technical supplementation of remote work, which is a weakness of the existing information security operation of public institutions. Also, how to prevent abnormal authentication attempts by building a secure VPN environment, how to prevent social engineering cyber attacks targeting fear and uncertainty caused by COVID-19, and how to use a smooth network and create a remote work environment. For this purpose, methods for securing service availability were additionally presented.

A Study on the Security Structure of Next Generation E-mail System (차세대 이메일 보안 기술에 관한 연구)

  • Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.183-189
    • /
    • 2008
  • E-mail's role has been increased due to its merit which is sending demanded information in real-time anywhere, anytime. However, Today's E-mail security threats have being changed intelligently to attack against the specific agency. The threat is a limit to respond. Therefore precise definition and development of security technology is needed to analyze changing environment and technologies of e-mail so that remove fundamental security threat. we proposed Next Generation E-mail System Security Structure and the Next Generation fusion System using authentication As a result, in this study, we development of Next Generation E-mail System Security Structure. This system can protect E-mail user from social engineering hacking technique, spam, virus, malicious code and fabrication.

  • PDF

A study on User Authentication Technology of Numeric based Pattern Password (숫자기반의 패턴 형식 패스워드 사용자인증 기술)

  • Ju, Seung-Hwan;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.65-73
    • /
    • 2012
  • The traditional text-based password is vulnerable guessing, dictionary attacks, keyloggers, social engineering, stole view, etc. these vulnerability effect more serious problem in a mobile environment. In this study, By using the pattern number to enter the password of an existing four-digit numeric password, User easily use to new password system. The technology on pattern based numerical password authorization proposed in this paper would intensify the security of password which holds existing 10 numbers of cases by authorizing a user and would not invade convenience of use by providing high security and making users memorize only four numbers like old method. Making users not have inconvenience and raising complexity, it would have a strength to an shoulder surfing attack of an attacker. So I study password system that represents the shape-based of number. I propose the new password system to prevent peeking attacks and Brute-force attack, and this proposal is to review the security and usability.

Shoulder Surfing Attack Modeling and Security Analysis on Commercial Keypad Schemes (어깨너머공격 모델링 및 보안 키패드 취약점 분석)

  • Kim, Sung-Hwan;Park, Min-Su;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1159-1174
    • /
    • 2014
  • As the use of smartphones and tablet PCs has exploded in recent years, there are many occasions where such devices are used for treating sensitive data such as financial transactions. Naturally, many types of attacks have evolved that target these devices. An attacker can capture a password by direct observation without using any skills in cracking. This is referred to as shoulder surfing and is one of the most effective methods. There has been only a crude definition of shoulder surfing. For example, the Common Evaluation Methodology(CEM) attack potential of Common Criteria (CC), an international standard, does not quantitatively express the strength of an authentication method against shoulder surfing. In this paper, we introduce a shoulder surfing risk calculation method supplements CC. Risk is calculated first by checking vulnerability conditions one by one and the method of the CC attack potential is applied for quantitative expression. We present a case study for security-enhanced QWERTY keyboard and numeric keypad input methods, and the commercially used mobile banking applications are analyzed for shoulder surfing risks.