exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 349 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 349
Topic #: 1
[All 312-50v11 Questions]

Stephen, an attacker, targeted the industrial control systems of an organization. He generated a fraudulent email with a malicious attachment and sent it to employees of the target organization. An employee who manages the sales software of the operational plant opened the fraudulent email and clicked on the malicious attachment. This resulted in the malicious attachment being downloaded and malware being injected into the sales software maintained in the victim's system. Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components.
What is the attack technique used by Stephen to damage the industrial systems?

  • A. HMI-based attack
  • B. SMishing attack
  • C. Reconnaissance attack
  • D. Spear-phishing attack
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
beowolf
Highly Voted 2 years, 8 months ago
If you look at this using the cyber kill chain model, the outcome of this attack is "Finally damaging the industrial automation components" this is the last step of the kill chain (Action on objective) but the question asks what is the attack technique, so in my opinion Spear-phishing is correct which is targeting a specific employee or group of employees rather than sending numerous phishing mails, in this case targeting a user in OT network.
upvoted 16 times
Gregman380
1 year, 5 months ago
Agreed. What is the attack technique.
upvoted 2 times
...
...
jinjection
Highly Voted 2 years, 8 months ago
Correct spear phishing
upvoted 7 times
...
sringan
Most Recent 6 months, 3 weeks ago
Selected Answer: D
Spear Phishing: Attackers send fake emails containing malicious links or attachments, seemingly originated from legitimate or well-known sources, to the victim. When the victim clicks on the link or downloads the attachment, it injects malware, starts damaging the resources, and spreads itself to other systems. For example, an attacker sends a fraudulent email with a malicious attachment to a victim system that maintains the sales software of the operational plant. When the victim downloads the attachment, the malware is injected into the sales software, propagates itself to other networked systems, and finally damages industrial automation components. (From CEH v12 Ebook Page no: 2952)
upvoted 2 times
...
Queto
8 months, 2 weeks ago
Straight from the official material, under OT Threats: Spear Phishing Attackers send fake emails containing malicious links or attachments, seemingly originated from legitimate or well-known sources, to the victim. When the victim clicks on the link or downloads the attachment, it injects malware, starts damaging the resources, and spreads itself to other systems. For example, an attacker sends a fraudulent email with a malicious attachment to a victim system that maintains the sales software of the operational plant. When the victim downloads the attachment, the malware is injected into the sales software, propagates itself to other networked systems, and finally damages industrial automation components
upvoted 2 times
...
steffBarj
10 months, 2 weeks ago
D --> Spear-phishing attack
upvoted 1 times
...
victorfs
1 year ago
Selected Answer: D
The correct option is D. D. Spear-phishing attack
upvoted 1 times
...
72SK
1 year, 1 month ago
Answer is D The attack technique used by Stephen to damage the industrial control systems is called "Spear Phishing Attack." Spear phishing is a type of social engineering attack where the attacker targets a specific individual or organization using a fraudulent email that appears to be from a trusted source. In this case, Stephen used a fraudulent email with a malicious attachment to trick the employee managing the sales software of the operational plant into downloading and executing the malware. Once the malware was executed, it propagated itself to other networked systems and finally damaged the industrial automation components. This type of attack is a common tactic used by cybercriminals to gain unauthorized access to critical systems and cause significant damage.
upvoted 1 times
...
olakoreba
1 year, 2 months ago
The correct ans is Spear-Phishing page 2724 CEH V11 see last paragrah
upvoted 1 times
...
Bob_234
1 year, 2 months ago
Selected Answer: D
it is not a, because hmi stand for human machine interface. human actions needed well i says 'self propogade' no human need so back to spear phising
upvoted 1 times
...
Shin_Frankie
1 year, 3 months ago
Selected Answer: D
" Further, the malware propagated itself to other networked systems, finally damaging the industrial automation components." it is not targeted on HMI
upvoted 2 times
...
noblethic
1 year, 4 months ago
Selected Answer: A
Spear phishing wasn't the technique to damage the ICS, it was just a medium for propagation.
upvoted 1 times
...
josevirtual
1 year, 5 months ago
Selected Answer: D
Why do these questions have to be so unclear, what's the point??? It asks about the "technique", and this question is mainly describing the spear phishing attack, so I go with D, but a perfect answer should be A and D.
upvoted 1 times
...
Daniel8660
1 year, 7 months ago
Selected Answer: D
Computer-based Social Engineering: Phishing Spear Phishing - Attackers opt for “spear phishing” and use specialized social engineering content directed at a specific employee or small group of employees in an organization to steal sensitive data such as financial information and trade secrets.The email also appears to be from an individual from the recipient's company, generally someone in a position of authority. (P.1241/1225)
upvoted 5 times
...
dinonino
1 year, 8 months ago
HMI-Based Attacks: Human–Machine Interfaces (HMIs) are often called Hacker–Machine Interfaces. Even with the advancement and automation of OT, human interaction and control over the operational process remain challenges due to the underlying vulnerabilities. The lack of global standards for developing HMI software without any defense-in-depth security measures leads to many security problems. Attackers exploit these vulnerabilities to perform various attacks such as memory corruption, code injection, privilege escalation, etc. on target OT systems. Spear Phishing: Attackers send fake emails containing malicious links or attachments, seemingly originated from legitimate or well-known sources, to the victim. When the victim clicks on the link or downloads the attachment, it injects malware, starts damaging the resources, and spreads itself to other systems. For example, an attacker sends a fraudulent email with a malicious attachment to a victim system that maintains the sales software of the operational plant. When the victim downloads the attachment, the malware is injected into the sales software, propagates itself to other networked systems, and finally damages industrial automation components. CEH Module 18 IoT and OT hacking Page 2708
upvoted 2 times
...
iamyearn7861
2 years, 1 month ago
key phrase = damage the industrial system
upvoted 1 times
...
[Removed]
2 years, 1 month ago
Selected Answer: D
From CEHv11 Book 2 pg. 2708 "Attackers send fake emails containing malicious links or attachments, seemingly originated from legitimate or well-known sources, to the victim. When the victim clicks on the link or downloads the attachment, it injects malware, starts damaging the resources, and spreads itself to other systems. For example, an attacker sends a fraudulent email with a malicious attachment to a victim system that maintains the sales software of the operational plant. When the victim downloads the attachment, the malware is injected into the sales software, propagates itself to other networked systems, and finally damages industrial automation components." Matches word for word. Its definitely spear phishing
upvoted 1 times
...
gokhansah1n
2 years, 3 months ago
Selected Answer: A
The initial vector is phishing and not spear phishing since the receipt of the fraudulent mail is not intented person by the attacker. Second, the phrase "malware being injected into the sales software maintained in the victim's system" gives clue that Human Machine Interface software is compromised. That is, the question refers to an HMI-based attack.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...