VERIFIED AND GRADED
Malicious Attachments - answer-malicious actors will
send you Microsoft Office documents to bypass email
scanners and to seem less suspicious
include malicious macros, series of command and
instructions, that download malware to the system
Reconnaissance emails (recon emails) - answer-
used to check if the destination mailbox is in use so
that it can be targeted in future phishing attack
can be spam, social engineering or tracking pixels
Credential Harvesters - answer-most common
phishing emails
,targeting human weaknesses to attempt to retrieve
valid credentials
email will tell the recipient to click a button or URL,
where they will typically be presented with a real-
looking login portal
Social Engineering - answer-the practice of exploiting
a human as opposed to a system
malicious actors can convince employees that they
are someone they know, or even someone in a
higher position that has more power than them
Smishing - answer-kind of phishing attack, where the
attack vector is through a text message or SMS
,best way to defend is user security awareness
training and education
Vishing - answer-kind of phishing attack, where the
attack vector is through a phone call
best way to defend is user security awareness
training and education
Whaling - answer-highly-targeted phishing attack that
looks to target individuals within management
positions in an organization
best way to defend is implementing DLP, marking
external emails, train individuals to detect phishing
emails
, Hosted Malware - answer-method of hosting malware
on websites and convincing users to click on a
hyperlink, download a file, and then run it
actor can create a malicious domain or compromise a
legitimate site then host the malware
Spam Emails - answer-messages that are
unsolicited, unwanted, or unexpected but are not
necessarily malicious in nature
should not be confused with malicious spam emails
False Positives - answer-messages that have not
been sent by a malicious actor and are instead
legitimate emails that have been incorrectly reported
as malicious