Social Engineering Notes
Social Engineering Notes
Introduction
As technical attacks on systems have increased, so have numerous technology based
countermeasures being used successfully to thwart them. As a result, attackers are
shifting their focus and are increasingly targeting people through the use of social
engineering methods, often gaining unnoticed access to computer systems and sensitive
data. This is due to the widely accepted fact that People are the ‘weakest links’ in a
security framework. In the era of laws and legislations such as SOX (Sarbanes-Oxley),
GLBA (Gramm-Leach-Bliley Act), HIPAA (Health Insurance Portability and Accountability
Act) and more, it becomes imperative for everyone to prepare, defend and react to these
attacks.
Key Challenges
Despite the humungous security threat posed by Social Engineering, very little is ever
highlighted about it. Primary reason for the lack of discussion about Social Engineering
can be attributed to shame. Most people see Social Engineering as an attack on their
intelligence and wit, and no one wants to be considered ignorant or dumb to have been
duped. This is why Social Engineering gets hidden in the closet as a "taboo" subject,
whereas the fact is that no matter who a person is, he / she may be susceptible to a
Social Engineering attack.
Behaviors Vulnerable to Social Engineering Attacks
Social Engineering has always been prevailing in some form or the other; primarily
because of the some very natural facets of human behavior. A social engineer exploits
these behavior patterns to drive the target towards becoming a victim in the attack.
Common human behaviors that are exploited by social engineers are shown in the
image provided hereunder.
Social engineering is still the most effective and probably the easiest method of getting
around security obstacles. Sign of a truly successful social engineer is that, they extract
information without raising any suspicion as to what they are doing.
Reverse Social Engineering on the other hand, describes a situation in which the
target itself makes the initial approach and offers hacker, the information that they want.
Such a scenario may seem unlikely, but figures of authority - particularly technical or
social authority - often receive vital personal information, such as user IDs and
passwords, because they are above suspicion. In this ‘cake-walk’ scenario for a hacker,
the victims themselves reveal information or provide the access, without someone trying
to manipulate them.
Categories of Social Engineering
There are two main categories under which all social engineering attempts could be
classified – computer or technology based deception, and purely human based
deception.
The technology-based approach is to deceive the user into believing that he is
interacting with a ‘real’ application or system and get him to provide confidential
information. For instance, the user gets a popup window, informing him that the
computer application has a problem, and the user will need to re-authenticate in order to
proceed. Once the user provides his ID and password on that pop up window, the
damage is done. The hacker who has created the popup now has access to the user’s id
and password and is in a position to access the network and the computer system with
credentials of that user.
Attacks based on non-technical approach are perpetrated purely through deception; i.e.
by taking advantage of the victim’s human behavior weaknesses (as described earlier).
For instance, the attacker impersonates a person having a big authority; places a call to
the help desk, and pretends to be a senior Manager, and says that he / she has
forgotten his password and needs to get it reset right away. The help desk person resets
the password and gives the new password to the person waiting at the other end of the
phone. The attacker now has all the access to perform any malicious activity with the
credentials of actual user.
Technical Attack Vectors
Phishing
This term applies to an email appearing to have come from a legitimate business, a
bank, or credit card company requesting "verification" of information and warning of
some dire consequences if it is not done. The letter usually contains a link to a
fraudulent web page that looks legitimate with company logos and content and has a
form that may request username, passwords, card numbers or pin details.
Prevention: If you received a unknown email message, do not respond to it. and don’t
even click on the links you received from the unknown users.
Vishing
It is the practice of leveraging Voice over Internet Protocol (VoIP) technology to trick
private personal and financial information from the public for the purpose of financial
reward. This term is a combination of "voice" and phishing. Vishing exploits the public's
trust in landline telephone services, which have traditionally terminated in physical
locations which are known to the telephone company, and associated with a bill-payer.
However, with the advent of VoIP, telephone services may now terminate in computers,
which are far more susceptible to fraudulent attacks than traditional "dumb" telephony
endpoints.
Spam Mails
E-mails that offer friendships, diversion, gifts and various free pictures and information
take advantage of the anonymity and camaraderie of the Internet to plant malicious
code. The employee opens e-mails and attachments through which Trojans, Viruses and
Worms and other uninvited programs find their way into systems and networks. He or
she is motivated to open the message because it appears to offer useful information,
such as security notices or verification of a purchase, promises an entertaining
diversion, such as jokes, gossip, cartoons or photographs, give away something for
nothing, such as music, videos or software downloads. The outcome can range in
severity from nuisance to system slow-down, destruction of entire communication
systems or corruption of records.
Popup Window
The attacker’s rogue program generates a pop up window, saying that the application
connectivity was dropped due to network problems, and now the user needs to reenter
his id and password to continue with his session. The unsuspecting user promptly does
as requested, because he wishes to continue working, and forgets about it. Later it is
heard that there has been an attack on the system, but it never realized that that he /
she was the one who opened the gate!
BATING
Baiting is like the real-world Trojan Horse that uses physical media and relies on the
curiosity or greed of the victim. in this attack, the attacker leaves a malware infected floppy
disk, CD ROM, or USB flash drive in a location sure to be found (bathroom, elevator,
sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply
waits for the victim to use the device.
For example, an attacker might create a disk featuring a corporate logo, readily available
from the target's web site, and write "Executive Salary Summary Q2 2010" on the front.
The attacker would then leave the disk on the floor of an elevator or somewhere in the
lobby of the targeted company. An unknowing employee might find it and subsequently
insert the disk into a computer to satisfy their curiosity, or a good samaritan might find it
and turn it in to the company.In either case as a consequence of merely inserting the disk
into a computer to see the contents, the user would unknowingly install malware on it, likely
giving an attacker unfettered access to the victim's PC and perhaps, the targeted
company's internal computer network.
Prevention: Don’t insert any devices which left unattended or given by unknown person
In a 2003 Information Security survey, 90% of office workers gave researchers what
they claimed was their password in answer to a survey question in exchange for a
cheap pen.Similar surveys in later years obtained similar results using chocolates and
other cheap lures, although they made no attempt to validate the passwords.
Non-Technical Attack Vectors
Pretexting / Impersonation
This is the act of creating and using an invented scenario (the pretext) to persuade a
target to release information or perform an action and is usually done over the
telephone. It's more than a simple lie as it most often involves some prior research or set
up and makes use of pieces of known information (e.g. date of birth, mother’s maiden
name, billing address etc.) to establish legitimacy in the mind of the target.
Prevention: Be cautious because strangers try to fool you by creating false situation and
make you to believe inorder to collect the confidential information.
Dumpster Diving
Seldom would someone think that throwing away junk mail or a routine company
document without shredding could be a risk. However, that is exactly what it could be, if
the junk mail contained personal identification information, or credit card offers that a
‘dumpster diver’ could use in carrying out identity theft. The unsuspecting ‘trash thrower’
could give the Dumpster Diver his break. Company phone books, organization charts
and locations of employees, especially management level employees who can be
impersonated to the hacker’s benefit. Unshredded procedure and policy manuals can
help the hacker to become knowledgeable about the company’s policies and
procedures, and thus be able to convince the victim about their authenticity. The hacker
can use a sheet of paper with the company letterhead to create official looking
correspondence. A hacker can retrieve confidential information from the hard disk of a
computer as there are numerous ways to retrieve information from disks, even if the user
thinks the data has been ‘deleted’ from the disk.
Prevention: Don’t dump any confidential papers into trash, before dumping make sure
you don’t have any important information in it.
Prevention: Beware don’t believe the e-mails received from unknown and don’t ever
give the financial information.
Authoritative Voice
The attacker can call up the company’s computer help desk and pretend to have trouble
accessing the system. He / she claims to be in a very big hurry, and needs his password
reset immediately and demands to know the password over the phone. If the attacker
adds credence to his / her story with information that has been picked up from other
social engineering methods, the help desk personnel is all the more likely to believe the
story and do as requested.