What is an impersonation attack that takes advantage of a trusted relationship between two system?

Phishing is quickly becoming an undetectable threat for businesses relying on traditional anti-phishing technology. Impersonation attacks are a prime example of a modern phishing scam: they’re targeted, sophisticated and rely on social engineering rather than malicious attachments or links. 

How do impersonation attacks work?

An impersonation attack happens when cybercriminals pose as a trusted contact to manipulate employees into transferring money or sharing sensitive information. Impersonation scams where someone is tricked into making a financial transfer, or leaking sensitive data, are known as business email compromise. 

The scam begins with the cybercriminal searching through social media profiles to collect information on their target. LinkedIn is particularly useful in this sense, as attackers can easily identify new joiners and chains of command. New employees are usually less familiar with normal company processes and they may be eager to please, making them the perfect targets for impersonation attacks. 

Next, the attackers choose who to impersonate:

  • An influential person within the organization: Attackers often impersonate a CEO or senior executive to convince lower-level employees to follow their instructions without hesitation.
  • A well-known brand: Cybercriminals took advantage of the pandemic to impersonate popular brands like Zoom and Microsoft in 2020. 
  • A third-party vendor: Attackers sometimes pretend to be suppliers to trick employees into paying fraudulent “overdue” invoices.

Impersonation tactics

Cybercriminals will use email spoofing or account takeover to trick their targets into believing their scam:

Email spoofing

Email spoofing is an easy impersonation tactic for fraudsters. They simply create a fake email address that looks very similar to the one they’re impersonating. For example, they might change a single character in the URL and alter the display name to make it appear legitimate.

Account takeover

Account takeover is more difficult to spot. Attackers use spear phishing to get their hands on login credentials and hack into the CEO’s account, for example. They then use the legitimate account to masquerade as the CEO and gain access to sensitive information by emailing employees.  

How to detect impersonation attacks

Unlike old-fashioned phishing attacks, impersonation attacks can be tricky to spot — especially if you have no knowledge of this kind of scam. However, there are certain things you can watch out for to stay one step ahead of cybercriminals.

Unfamiliar email address

The display name and the email address are two different things. A cybercriminal can easily change the display name to a co-worker’s name. However, it’s much harder for them to change the actual email address they used. 

For example, If the real address is “”, criminals could change this slightly to “” to trick you. To reveal the actual address URL, hover over the display name or if you’re using mobile, press and hold the display name. 

But remember this is only effective against email spoofing attempts. Account takeover is not as easy to spot, so make sure to keep your eyes peeled for other tell-tale signs too. 

Attempts to bypass standard procedure

Most organizations have standard procedures in place when dealing with personal data and wire transfers. If you receive an email from a colleague that doesn’t align with company practices, proceed cautiously — especially if they claim you need to follow their instructions due to an emergency.

Unusual content

Fraudsters have come a long way from traditional phishing emails riddled with spelling errors. But consider how they write, not just what they’re writing. 

As many phishing scams originate from outside the US, in non-English speaking countries, you may notice unusual grammatical choices. You may also find that the tone of voice isn’t quite right. If you’ve exchanged emails with the “sender” previously, you’ll know what’s too familiar or too formal in relation to their tone of voice. Trust your instinct, and don’t respond if you have any doubts over the legitimacy of an email.

Urgent language

Cybercriminals use urgency and veiled threats to coax recipients into making snap decisions. A sender will use phrases like “ASAP,” “urgent,” and “confidential” to prevent you from discussing the issue with peers and encourage you to act on the spot. 

Veiled threats are also common in these kinds of attacks. For example, in the following email:

“Dear Mr. Smith,

Our latest invoice for $459.78 has not been paid. If this is not settled within 24 hours, we will have no option but to cancel our future shipments to your organization. Our bank details are: XXXX XXXX XXXX
Thank you in advance,

Mr. King”

The supplier uses both urgent language and a veiled threat to convince recipients to follow their instructions immediately. Be wary of these tactics when going through your inbox.

How to prevent impersonation attacks

Secure your email

Anti-phishing technology is the most effective way to prevent impersonation attacks. Although traditional spam filters may not be enough to detect a sophisticated attack, there are tools out there that can, like Egress Defend. 

Egress Defend uses machine learning to analyze the content and context of an email. The cutting-edge software alerts recipients to context-driven impersonation attacks in real-time. Impersonation attacks are only successful when humans take the bait. Egress Defend prevents this from happening by taking human error out of the equation.

Educate your team

Sharing advice and instructing your team to be vigilant can also help your business to stay protected. 

Criminals often try to impersonate members of the c-suite and other executives within a company, as new recruits and lower-level employees are more likely to listen to these senior figures. Inform c-suite members of the risk of impersonation and provide helpful tips on how they can use social media sensibly to prevent impersonation attempts.

Ensure all new employees are given training so that they understand how to detect an impersonation attack and what they should do if their accounts are compromised.

Verify the information

If you’re still not sure whether or not an email is a scam, don’t assume. Seek verification. For example, if you receive an email from a supplier about a late payment that needs to be settled, it can be tempting to fulfill the request — especially if there’s a veiled threat in the message. But making bold assumptions about the credibility of a request can lead to dire business consequences.

Take a step back from the situation and call the sender to verify if the information is correct and if the email is legitimate.

Learn more about phishing threats

With modern tactics to bypass traditional controls, cyberattacks are becoming harder and harder to detect. 

Explore our phishing hub for advice on how you can keep you and your organization protected against these cyberattacks.

Last Updated on June 14, 2021 by Admin

Cybersecurity Essentials 1.12 Final Exam Answers 2021

    • Block ciphers result in compressed output.
    • Block ciphers result in output data that is larger than the input data most of the time.
    • Block ciphers are faster than stream ciphers.
    • Block ciphers encrypt plaintext one bit at a time to form a block.
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • RAM spoofing
    • SQL injection
    • buffer overflow
    • RAM Injection
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • The National Vulnerability Database website
    • CERT
    • The Advanced Cyber Security Center
    • Internet Storm Center
      Answers Explanation & Hints:

      There are several cybersecurity information websites that a cybersecurity specialist uses to evaluate the potential vulnerabilities of an organization. Some of these websites are the National Vulnerability Database, CERT, the Internet Storm Center, and the Advanced Cyber Security Center.

    • exposure factor
    • quantitative loss value
    • annual rate of occurrence
    • single loss expectancy
    • frequency factor
    • asset value
      Answers Explanation & Hints:

      Single loss expectancy, annualized rate of occurrence, and annualized loss expectancy are used in a quantitative risk analysis

    • man-in-the-middle
    • SQL injection
    • packet Injection
    • DoS
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • wireless sniffing
    • man-in-the-middle
    • wireless IP spoofing
    • wireless poisoning
      Answers Explanation & Hints:

      A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

    • 3DES
    • ECC
    • RSA
    • Diffie-Hellman
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • containment and recovery
    • mitigation and acceptance
    • detection and analysis
    • prevention and containment
    • risk analysis and high availability
    • confidentiality and eradication
      Answers Explanation & Hints:

      When an incident occurs, the organization must know how to respond. An organization needs to develop an incident response plan that includes several phases.

    • vulnerability scanners
    • password crackers
    • packet analyzers
    • packet sniffers
      Answers Explanation & Hints:

      There are many tools that a cybersecurity specialist uses to evaluate the potential vulnerabilities of an organization.

    • Keyspace decreases proportionally.
    • Keyspace increases exponentially.
    • Keyspace decreases exponentially.
    • Keyspace increases proportionally.
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • exposure factor analysis
    • quantitative analysis
    • qualitative analysis
    • loss analysis
      Answers Explanation & Hints:

      A qualitative or quantitative risk analysis is used to identify and prioritize threats to the organization.

    • asset classification
    • asset availability
    • asset identification
    • asset standardization
      Answers Explanation & Hints:

      One of the most important steps in risk management is asset classification.

    • password digest
    • reverse lookup tables
    • rouge access points
    • lookup tables
    • rainbow tables
    • algorithm tables
      Answers Explanation & Hints:

      Tables that contain possible password combinations are used to crack passwords.

    • man-in-the-middle
    • spoofing
    • spamming
    • sniffing
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • They are part of a protest group behind a political cause.
    • They are curious and learning hacking skills.
    • They are interested in discovering new exploits.
    • They are trying to show off their hacking skills.
      Answers Explanation & Hints:

      Each type of cybercriminal has a distinct motivation for his or her actions.

    • trusted partners
    • hacktivists
    • ex-employees
    • black hat hackers
    • amateurs
      Answers Explanation & Hints:

      Threats are classified as being from an internal source or external source. A cybersecurity specialist needs to be aware of the source of various threats.

    • AES
    • HMAC
    • salting
    • MD5
      Answers Explanation & Hints:

      The difference between HMAC and hashing is the use of keys.

    • sniffing
    • phishing
    • spamming
    • spoofing
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • the same pre-shared key he used with Alice
    • the private key of Carol
    • the public key of Bob
    • a new pre-shared key
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • RAID
    • N+1
    • hot standby
    • software updates
      Answers Explanation & Hints:

      System and data availability is a critical responsibility of a cybersecurity specialist. It is important to understand the technologies, process, and controls used to provide redundancy.

    • ISO/IEC 27000 program
    • Infragard
    • CVE database
    • Honeynet project
      Answers Explanation & Hints:

      Early warning systems help identify attacks and can be used by cybersecurity specialists to protect systems.

    • Implement intrusion detection systems.
    • Implement a firewall.
    • Implement a VLAN.
    • Implement RAID.
      Answers Explanation & Hints:

      Protecting data confidentiality requires an understanding of the technologies used to protect data in all three data states.

    • SEO poisoning
    • DNS poisoning
    • spam
    • browser hijacker
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • SSH
    • strong authentication
    • encrypted voice messages
    • ARP
      Answers Explanation & Hints:

      Many advanced technologies such as VoIP, streaming video, and electronic conferencing require advanced countermeasures.

    • It deters casual trespassers only.
    • The fence deters determined intruders.
    • It offers limited delay to a determined intruder.
    • It prevents casual trespassers because of its height.
      Answers Explanation & Hints:

      Security standards have been developed to assist organizations in implementing the proper controls to mitigate potential threats. The height of a fence determines the level of protection from intruders

    • RIP
    • IP
    • ICMP
    • WPA2
    • STP
    • ARP
      Answers Explanation & Hints:

      Network switches are the heart of the modern data communication network. The main threats to network switches are theft, hacking and remote access, and attacks against network protocols.

    • asymmetric encryption
    • digital signature
    • digital certificate
    • salting
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • user login auditing
    • a set of attributes that describes user access rights
    • a biometric fingerprint reader
    • observations to be provided to all employees
      Answers Explanation & Hints:

      Access control prevents unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

    • TKIP
    • 802.11q
    • WPA
    • 802.11i
    • WEP
    • WPA2
      Answers Explanation & Hints:

      Various protocols can be used to provide secure communication systems. AES is the strongest encryption algorithm.

    • logical
    • physical
    • technological
    • administrative
      Answers Explanation & Hints:

      Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

    • CRC
    • password
    • salting
    • HMAC
      Answers Explanation & Hints:

      HMAC is an algorithm used to authenticate. The sender and receiver have a secret key that is used along with the data to ensure the message origin as well as the authenticity of the data.

    • biometrics
    • strong passwords
    • digital certificates
    • security tokens
      Answers Explanation & Hints:

      Digital certificates protect the parties involved in a secure communication

    • VPN
    • NAC
    • NAS
    • SAN
      Answers Explanation & Hints:

      A cybersecurity specialist must be aware of the technologies available to enforce its organization’s security policy.

    • social engineering
    • ransomeware
    • man-in-the-middle
    • pharming
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • phishing
    • worm
    • spam
    • virus
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

    • encrypted data
    • data in-process
    • data in-transit
    • stored data
      Answers Explanation & Hints:

      A cybersecurity specialist must be familiar with the types of technologies used to store, transmit, and process data.

    • encryption algorithm
    • reverse engineering
    • key length
    • key management
      Answers Explanation & Hints:

      Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

    • VPNs and VLANs
    • IDS and IPS
    • tokens and hashes
    • passwords and fingerprints
      Answers Explanation & Hints:

      A cybersecurity specialist must be aware of the technologies available that support the CIA triad.

    • preventive
    • corrective
    • management
    • detective
      Answers Explanation & Hints:

      A disaster recovery plan enables an organization to prepare for potential disasters and minimize the resulting downtime.

    • Telnet
    • SCP
    • WPA
    • SSH
      Answers Explanation & Hints:

      Various application layer protocols are used to for communications between systems. A secure protocol provides a secure channel over an unsecured network.

    • sneaker net
    • wired networks
    • virtual networks
    • wireless networks
      Answers Explanation & Hints:

      A cybersecurity specialist must be familiar with the types of technologies used to store, transmit, and process data.

    • after the organization has experienced a breach in order to restore everything back to a normal state
    • when the organization needs to look for prohibited activity
    • when the organization needs to repair damage
    • when the organization cannot use a guard dog, so it is necessary to consider an alternative
      Answers Explanation & Hints:

      Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

    • layering
    • simplicity
    • obscurity
    • limiting
      Answers Explanation & Hints:

      System and data availability is a critical responsibility of a cybersecurity specialist. It is important to understand the technologies, process, and controls used to protect provide high availability.

    • WPA2
    • WPA
    • WEP2
    • WEP
      Answers Explanation & Hints:

      Wireless security depends on several industry standards and has progressed from WEP to WPA and finally WPA2.

    • asymmetric encryption
    • digital certificate
    • digital signature
    • HMAC
      Answers Explanation & Hints:

      A digital signature is used to establish authenticity, integrity, and nonrepudiation.

    • single point of failure
    • system resiliency
    • fault tolerance
    • uninterruptible services
      Answers Explanation & Hints:

      High availability can be achieved by eliminating or reducing single points of failure, by implementing system resiliency, and by designing for fault tolerance.

    • The Federal Information Security Management Act
    • Import/Export Encryption Act
    • Sarbanes-Oxley Act
    • Gramm-Leach-Bliley Act
      Answers Explanation & Hints:

      New laws and regulations have come about to protect organizations, citizens, and nations from cybersecurity attacks.

    • NIST/NICE framework
    • Infragard
    • ISO/IEC 27000 model
    • CVE national database
      Answers Explanation & Hints:

      A cybersecurity specialist needs to be familiar with the resources such as the CVE database, Infragard, and the NIST/NISE framework. All can be used to help plan and implement effective an information security management system.

    • referential integrity
    • domain integrity
    • entity integrity
    • user-defined integrity
      Answers Explanation & Hints:

      Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies that are used to ensure data integrity.

    • a limitation rule which has been implemented to prevent unauthorized staff from entering sensitive data
    • data encryption operations that prevent any unauthorized users from accessing sensitive data
    • data entry controls which only allow entry staff to view current data
    • a validation rule which has been implemented to ensure completeness, accuracy, and consistency of data
      Answers Explanation & Hints:

      Data integrity deals with data validation.