Social Engineering, beware not to fall victim
Social
engineering is the art of manipulating people so they give up confidential
information. The types of information these criminals are seeking can vary, but
when individuals are targeted the criminals are usually trying to trick you
into giving them your passwords or bank information, or access your computer to
secretly install malicious software–that will give them access to your
passwords and bank information as well as giving them control over your
computer Eg: wifiphisher.
Criminals use social engineering tactics because
it is usually easier to exploit your natural inclination to trust than it is to
discover ways to hack your software. For example, it is much easier to
fool someone into giving you their password than it is for you to try hacking
their password (unless the password is really weak).
Security is all about knowing who and what to
trust. Knowing when, and when not to, to take a person at their word; when to
trust that the person you are communicating with is indeed the person you think
you are communicating with; when to trust that a website is or isn’t
legitimate; when to trust that the person on the phone is or isn’t legitimate;
when providing your information is or isn’t a good idea.
The weakest link in the security chain is the
human who accepts a person or scenario at face value. It doesn’t matter how
many locks and deadbolts are on your doors and windows, or if have guard dogs,
alarm systems, floodlights, fences with barbed wire, and armed security
personnel; if you trust the person at the gate who says he is the pizza
delivery guy and you let him in without first checking to see if he is
legitimate you are completely exposed to whatever risk he represents.
What
are the techniques used?
Pretexting
It is the act of creating
and using an invented scenario (the pretext) to engage a targeted victim in a manner that
increases the chance the victim will divulge information or perform actions
that would be unlikely in ordinary circumstances. An elaborate lie, it most often
involves some prior research or setup and the use of this information for
impersonation (e.g., date of birth, Social Security number, last bill amount)
to establish legitimacy in the mind of
the target.
This technique can be used to
fool a business into disclosing customer information as well as by private investigators to obtain telephone
records, utility records, banking records and other information directly from
company service representatives. The information can then be used to establish
even greater legitimacy under tougher questioning with a manager, e.g.,
to make account changes, get specific balances, etc.
Pretexting can also be used to
impersonate co-workers, police, bank, tax authorities, clergy, insurance
investigators—or any other individual who could have perceived authority or
right-to-know in the mind of the targeted victim. The pretexter must simply
prepare answers to questions that might be asked by the victim. In some cases,
all that is needed is a voice that sounds authoritative, an earnest tone, and
an ability to think on one's feet to create a pretextual scenario.
Diversion theft
Diversion theft, also known as the "Corner Game" or
"Round the Corner Game", originated in the East End of London.
Diversion theft is a "con" exercised by professional
thieves, normally against a transport or courier company. The objective is to
persuade the people responsible for a legitimate delivery that the consignment
is requested elsewhere—hence, "round the corner".
Phishing
Phishing is a technique of
fraudulently obtaining private information. Typically, the phisher sends an
e-mail that appears to come from a legitimate business—a bank, or credit card
company—requesting "verification" of information and warning of
some dire consequence if it is not provided.
The e-mail usually contains a link to a fraudulent web page that seems
legitimate—with company logos and content—and has a form requesting everything
from a home address to an ATM card's PIN or a credit card number.
For example, in 2003, there was a phishing scam in which users received e-mails
supposedly from eBay claiming
that the user's account was about to be suspended unless a link provided was
clicked to update a credit card (information that the genuine eBay already
had). Because it is relatively simple to make a Web site resemble a legitimate
organization's site by mimicking the HTML code and logos the scam counted on
people being tricked into thinking they were being contacted by eBay and
subsequently, were going to eBay's site to update their account information.
By spamming large
groups of people, the "phisher" counted on the e-mail being read by a
percentage of people who already had listed credit card numbers with eBay
legitimately, who might respond.
Spear phishing
Although similar to
"phishing", spear phishing is a technique that fraudulently obtains
private information by sending highly customized emails to few end users. It is
the main difference between phishing attacks because phishing campaigns focus
on sending out high volumes of generalized emails with the expectation that
only a few people will respond. On the other hand, spear phishing emails
require the attacker to perform additional research on their targets in order
to "trick" end users into performing requested activities. The
success rate of spear-phishing attacks is considerably higher than phishing
attacks with people opening roughly 3% of phishing emails when compared to
roughly 70% of potential attempts. However, when users actually open the emails
phishing emails have a relatively modest 5% success rate to have the link or
attachment clicked when compared to a spear-phishing attack's 50% success rate.
Baiting
Baiting is like the real-world Trojan horse that
uses physical media and relies on the curiosity or greed of the victim. In
this attack, attackers leave malware-infected floppy disks, CD-ROMs,
or USB flash drives in locations people will
find them (bathrooms, elevators, sidewalks, parking lots, etc.), give them
legitimate and curiosity-piquing labels, and waits for victims.
Other types
Common confidence
tricksters or fraudsters also could be considered "social
engineers" in the wider sense, in that they deliberately deceive and
manipulate people, exploiting human weaknesses to obtain personal benefit. They
may, for example, use social engineering techniques as part of an IT fraud.
A very recent type of social engineering technique includes
spoofing or hacking IDs of people having popular e-mail IDs such as Yahoo!, Gmail, Hotmail,
etc. Among the many motivations for deception are:
·
Phishing credit-card
account numbers and their passwords.
·
Cracking
private e-mails and chat histories, and manipulating them by using common
editing techniques before using them to extort money and creating distrust
among individuals.
·
Cracking
websites of companies or organizations and destroying their reputation.
·
Computer virus hoaxes
·
Convincing
users to run malicious code within the web browser via self-XSS attack
to allow access to their web account
Countermeasures:
Organizations reduce their security risks by:
Standard Framework Establishing
frameworks of trust on an employee/personnel level (i.e., specify and train
personnel when/where/why/how sensitive information should be handled)
Scrutinizing Information Identifying which information is sensitive and evaluating
its exposure to social engineering and breakdowns in security systems
(building, computer system, etc.)
Security Protocols Establishing
security protocols, policies, and procedures for handling sensitive
information.
Training to Employees Training employees in security protocols relevant to their
position. (e.g., in situations such as tailgating, if a person's identity
cannot be verified, then employees must be trained to politely refuse.)
Event Test Performing
unannounced, periodic tests of the security framework.
Inoculation Preventing
social engineering and other fraudulent tricks or traps by instilling a
resistance to persuasion attempts through exposure to similar or related
attempts.
Review the above steps
regularly: no solutions to information integrity are perfect.
Waste Management Using
a waste management service that has dumpsters with locks on them, with keys to
them limited only to the waste management company and the cleaning staff.
Locating the dumpster either in view of employees so that trying to access it
carries a risk of being seen or caught, or behind a locked gate or fence where
the person must trespass before they can attempt to access the dumpster.
Slow down: Spammers want you to act
first and think later. If the message conveys a sense of urgency, or uses
high-pressure sales tactics be skeptical; never let their urgency influence
your careful review.
Research the
facts: Be
suspicious of any unsolicited messages. If the email looks like it is from a
company you use, do your own research. Use a search engine to go to the real
company’s site, or a phone directory to find their phone number.
Delete any
request for financial information or passwords. If you get asked to reply
to a message with personal information, it’s a scam.
Reject
requests for help or offers of help. Legitimate
companies and organizations do not contact you to provide help. If you did not
specifically request assistance from the sender, consider any offer to ’help’
restore credit scores, refinance a home, answer your question, etc., a scam.
Similarly, if you receive a request for help from a charity or organization
that you do not have a relationship with, delete it. To give, seek out
reputable charitable organizations on your own to avoid falling for a
scam.
Don’t let a
link in control of where you land. Stay
in control by finding the website yourself using a search engine to be sure you
land where you intend to land. Hovering over links in email will show the
actual URL at the bottom, but a good fake can still steer you wrong.
Curiosity
leads to careless clicking–if you
don’t know what the email is about, clicking links is a poor choice. Similarly,
never use phone numbers from the email; it is easy for a scammer to pretend
you’re talking to a bank teller.
Email
hijacking is rampant.
Hackers, spammers, and social engineerers taking over control of people’s email
accounts (and other communication accounts) has become rampant. Once they
control someone’s email account they prey on the trust of all the person’s
contacts. Even when the sender appears to be someone you know, if you aren’t
expecting an email with a link or attachment check with your friend before
opening links or downloading.
Beware of any
download. If you
don’t know the sender personally AND expect a file from them, downloading
anything is a mistake.
Foreign offers
are fake. If you
receive email from a foreign lottery or sweepstakes, money from an unknown
relative, or requests to transfer funds from a foreign country for a share of
the money it is guaranteed to be a scam.
Set your spam
filters to high. Every
email program has spam filters. To find yours, look under your settings
options, and set these high–just remember to check your spam folder
periodically to see if legitimate email has been accidentally trapped there.
You can also search for a step-by-step guide to setting your spam filters by
searching on the name of your email provider plus the phrase ’spam filters’.
Secure your
computing devices. Install anti-virus software, firewalls, email
filters and keep these up-to-date. Set your operating system to automatically
update, and if your smartphone doesn’t automatically update, manually update it
whenever you receive a notice to do so. Use an anti-phishing tool offered
by your web browser or third party to alert you to risks.
Comments
Post a Comment