Shawn Oden

@codefumonkey

codefumonkey.com

If You Teach a Man to Phish ...

Click HERE to learn how to make money with my new crypto  scam  scheme...

event_logo

Who Am I?

 

Database Administrator

Programmer

Former Pilot

Cybersecurity-Curious Geek

 

Shawn Oden

@codefumonkey

codefumonkey.com

event_logo

What Are We Going To Talk About?

Some Common Cyber/Personal Security Definitions

Different Types of Scams

How Can We Recognize Scams?

What Can We Do To Stop Scams?

The History of Tricking People

event_logo

Who Is Responsible For Cybersecurity?

HINT:

This is a trick question.

event_logo

Quick Definitions:

Threat Actor = Bad Guys

event_logo

Quick Definitions:

Phishing is a type of social engineering in which the Threat Actor uses some type of electronic medium, such as email, cellphone, or text messaging, to trick someone into giving up information that allows that Threat Actor to perform additional crime against that person or their organization.

event_logo

Quick Definitions:

SPEAR PHISHING

WHALING

SMISHING

VISHING

BEC (Business Email Compromise)

QUISHING (I didn't name it.)

event_logo

Quick Definitions:

Social Engineering is a manipulation technique used to trick people into giving up some sort of sensitive information that allows them to gain unauthorized access to a system or perform various other malicious actions. It uses psychological manipulation to exploit human trust rather than engaging in direct technical vulnerabilities. It covers several types of attacks.

event_logo

Types of Social Engineering:

PRETEXTING
BAITING
QUID PRO QUO
WATERING HOLE ATTACK
JOB SCAMS
ROMANCE SCAMS / HONEYTRAP
PIG BUTCHERING
TAILGATING

event_logo

A Quick History:

Social Engineering has been around about as long as people have.

event_logo

A Quick History:

Social Engineering has been around about as long as people have.

event_logo

A Quick History:

And it has evolved.

event_logo

A Quick History:

And it has evolved.

event_logo

A Quick History:

And it has evolved.

event_logo

A Quick History:

And it has evolved.

event_logo

A Quick History:

A lot.

event_logo

A Quick History:

A whole lot.

event_logo

Why Do People Fall For These?

TRUST
GREED
CURIOSITY
DESIRE TO HELP / PLEASE OTHERS
FEAR / ANXIETY
LONELINESS
FOMO
HUBRIS
WE'RE HUMAN

event_logo

We're Wired This Way.

event_logo

How Do We Spot The Scams?

BEWARE OF IMAGES IN AN EMAIL!

UNKNOWN SENDER UNEXPECTED MESSAGE
BAD GRAMMAR
POPUPS
SCARY TITLES
URGENT RESPONSE NEEDED
ASKING FOR MONEY/INFO/??? I NEED YOUR CREDENTIALS
LINKS IN MESSAGE ATTACHMENTS
TOO GOOD TO BE TRUE OH NO! YOU HAVE A VIRUS! CALL US!
PAY IN GIFT CARDS PAY IN BITCOIN
event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

Let's Look At Some Examples.

event_logo

The Threat Of AI Is Here.

event_logo

What Can We Do?

event_logo

What Can We Do?

event_logo

Be Suspicious of Unknown Messages / Phone Calls

Don't Engage With Contacts You Don't Know

Keep Your Software Updated

Use Anti-Malware (and keep IT updated)

Don't Overshare / Watch Your Social Media

Don't Send Sensitive Info Over Email

Use a Password Locker (like 1Password)

Monitor Your Info (like HaveIBeenPwned.com) / OSINT

Use a Good Phish-Resistant MFA

What Can We Do?

STOP.

BREATHE.

THINK.

BE SMART.

event_logo

AWARENESS

Who Is Responsible For Cybersecurity?

event_logo

How Do I Learn More?

event_logo

SANS Internet Storm Center Stormcast Podcast (https://isc.sans.edu/podcast.html)
Scammer Payback (YouTube) (https://www.youtube.com/@ScammerPayback)
Malicious Life Podcast (https://malicious.life/)
Darknet Diaries Podcast (https://darknetdiaries.com/)
Phishing.org (https://www.phishing.org/)
IBM - Humans vs AI. Who's Better At Phishing? (YouTube) (https://www.youtube.com/watch?v=7XhySwUn9eA)
U.S. CISA - Cyber Awareness Program (https://www.cisa.gov/resources-tools/programs/cisa-cybersecurity-awareness-program)
KnowBe4 Cybersecurity Resource Kits (https://www.knowbe4.com/resources/kits)
ProofPoint - Social Engineering Awareness (https://www.proofpoint.com/us/threat-reference/social-engineering)
Fortinet - Social Engineering Awareness (https://www.fortinet.com/resources/cyberglossary/social-engineering)
SANS OUCH! Newsletters (https://www.sans.org/newsletters/ouch)

Thank You!

event_logo

Shawn Oden | codefumonkey@gmail.com | @CodeFuMonkey | codefumonkey.com

Thank You To Our Sponsors!

If You Teach A Man To Phish ... (V2.1) (SQL Saturday Baton Rouge 2025)

By Shawn Oden

If You Teach A Man To Phish ... (V2.1) (SQL Saturday Baton Rouge 2025)

It seems like we're constantly under attack by someone trying to steal our money or our personal information. Scammers are constantly on the prowl for victims, and phishing is one of their favorite tools. In this talk, I'll teach you how to spot it and other scams, so that you can avoid becoming one of those victims.

  • 68