SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Downloaden Sie, um offline zu lesen
Social Engineering In A Networked World
Social engineering risk overview and counter measures
Social Engineering In A Networked World
What is Social Engineering?
An interpersonal interaction in which one
person (attacker) manipulates the other
part(ies) into revealing information they
shouldn’t or performing a task which the
attacker desires.
What is Social Engineering?
Phishing is NOT social engineering.
It is a tool used by social engineers.
Big difference!
If no interpersonal communications are involved, It’s
NOT social engineering. Can be phone call or in
person. NOT email. If it can be automated, it’s not
social Engineering.
Social Engineering In A Networked World
Famous (Recent) SE Incidents:
White House Hack
Anonymous
Mat Honan
Coca-Cola
AT&T
Ugnazi
Social Engineering In A Networked World
Identification
Best targets:
• Business resources
• Social media
• Government filings
Groups in turmoil usually yield:
• Disgruntled/alienated employees
• W/layoffs current/past employees open to
bribery/malicious intent
• With staff churn much easier to insert “new
employee”
Social Engineering In A Networked World
Social Engineering In A Networked World
The Attack
• Identify the targets
• Create the dossier / perform OSINT recon
Launch the attack – “social handshake”
• Create PST
• Profit
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
Critical to the success of creating a PST
Purpose is to generate either actionable
intelligence, or create a repository of
Data to use in “push polling”
Example: Here
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
To create the PST we target:
• Company
• Employees
• Contractors
• Suppliers
• Competitors
Social Engineering In A Networked World
Company Flags:
• Physical plant
• Security systems
• Internal lingo
• Computer/phone systems
• Operational information
• Competitors
• Voicemail/phone directory enumeration
• Dumpster diving
• Lobby Surfing (Lunch groups)
Social Engineering In A Networked World
LobbySurfing:
• Vendor/client/employee names (sign-in
sheet/“welcome visitor” lobby signs)
• Employee names, positions and home
addresses (magazine labels)
• General assessment of overall security
posture (are cameras present? PTZ/fixed?
Are proximity cards orbiometrics in use?
Guards? Is piggybacking allowed?).
Social Engineering In A Networked World
Ask and Ye Shall Receive!
Want some hard to get / esoteric
information about a company?
ASK for it (or ASK.com for it) or get on
one of the employee social advice
networks.
Social Engineering In A Networked World
Social Engineering In A Networked World
Social Engineering In A Networked World
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
To create the PST we target:
• Company
• Employees
• Contractors
• Suppliers
• Competitors
Employee Flags
• Interests (political, sports)
• Common hangouts (4Square)
• Religion
• Pets / Relatives (password cracking)
• Open to “relationship” (single)
• Open to blackmail (dating sites, illicit
sites)
• Open to bribery
• Open to phishing (sophistication)
Social Engineering In A Networked World
Employee Data
• Spokeo
• Flickr (Metadata)
• LinkedIn
• Facebook
• Home address – networks/property
vulnerable to penetration
Social Engineering In A Networked World
Social Networks
We beat this one to death, for good reason:
Social networks are an OSINT goldmine!
FourSquare not only gives you realtime
geolocation of a target (not to mention
“tips” and a person’s history of attendance)…
Social Engineering In A Networked World
What is Social Engineering?
• Operating System
• Type of AV
• Program used to open PDF’s
• Word processing,
spreadsheet software
• Internet browser used
• Email client
All important pieces of
information.
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
To create the PST we target:
• Company
• Employees
• Contractors
• Suppliers
• Competitors
Social Engineering In A Networked World
Contractors
• Technicalcontractors (programmers, IT
personnel)
• Janitorial service
• Security guards
• Alarm company
• HVAC
All have physical or logical access
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
To create the PST we target:
• Company
• Employees
• Contractors
• Suppliers
• Competitors
Social Engineering In A Networked World
Suppliers
Often the easiest to manipulate.
• Security appliance manufacturers
• Security software
• Managed services
• Alarm company
Contact the security appliance vendor
posing as the new POC.
Social Engineering In A Networked World
Social Engineering In A Networked World
The Dossier
To create the PST we target:
• Company
• Employees
• Contractors
• Suppliers
• Competitors
Social Engineering In A Networked World
Competitors
Couched properly, probing competitors
can yield great results. The competitor to
the target will freely give you information
concerning their rivals in the
marketplace.
Competitorswill often maintain their own
dossiers on the target
Social Engineering In A Networked World
Great OSINT sources:
ASK.com
Blogspot
LinkedIn
Cnet forums
Data Center Knowledge
Gov’t sites
Indeed.com
Information Week
Cityfreq
Facebook
Flickr
FourSquare
Glassdoor
Google & Bing
MySpace
Pipl/PlaxoQuora
Reddit
Spokeo
TinEye
Maltego
FOCA
Twitter
YahooAnswers
Social Engineering In A Networked World
The Social Handshake
The presentation of the pretext to the target
Efficacy lift can be gained via:
• Push polling (information gleaned by OSINT
or observation)
• Psychological gambits (humor/sympathy)
• Trust transference (using an established social
handshake to gain trust of another)
• Authority-based pre-texts
Social Engineering In A Networked World
The Social Handshake
The most critical part of a successful SE attack
Occurs during the initial interaction between the
attacker and the victim
Establishing this initial connection is not nearly
As difficult as one might think…
Social Engineering In A Networked World
The Social Handshake
In fact, past history has shown that
intelligence agents have an over 80%
success rate with establishing a connection
over the phones with targets with extremely
basic introductions, such as asking “can I
have a few minutes of your time?”
Social Engineering In A Networked World
The PST
Persistent Social Threat
• An ongoing social relationship that can
last for years
• Targeted for their access/knowledge
• Not used in low-level / attacks / one-off’s
• Don’t use them (normally) directly for
network attacks
• Want to avoid “burning” them
Social Engineering In A Networked World
The PST
Incredibly devastating to an enterprise
because:
• Not detectable via firewall logs
• Not blocked by anti-virus solutions
• The duped target is not likely to come
forward and reveal themselves if
attack is uncovered
Social Engineering In A Networked World
What is Social Engineering?
An interpersonal interaction in which one
person (attacker) manipulates the other
part(ies) into revealing information they
shouldn’t or performing a task which the
attacker desires.
Social Engineering In A Networked World
What is Social Engineering?
An interpersonal interaction in which one
person (attacker) manipulates the other
part(ies) into revealing information they
shouldn’t or performing a task which the
attacker desires.
Social Engineering In A Networked World
Why Does It Work?
An effective social engineer exploits
common psychological weaknesses.
Humans are inefficient at detecting
deception, on average only detecting
deception correctly in 54% of
interactions
Social Engineering In A Networked World
Why Does It Work?
Most people rely on inaccurate methods
such as eye contact and body languages that
are not reflected in reality.
As such, an effective attacker will maintain
eye contact when telling critical lies, or avert
eye contact when they want their target to
think they are lying.
Social Engineering In A Networked World
Successful Pretext
Pre-Text: The “story” the attacker tells.
A successful pretext is often driven bythe
end data points that the attacker desires
to gather.
Social Engineering In A Networked World
Delayed Validation
The attacker contacts the target and
informs them that they will be coming
on-site in the near future and that the
call is to introduce himself and the
purpose of the visit. This method is very
effective since the attacker at first does
not attempt to elicit any information,
Just to set the date.
Social Engineering In A Networked World
Delayed Validation
Aker small talk, attacker asks for hotel
recommendations, tourist attractions,etc.
As this is happening, the target
subconsciously at ease, since they think
they will have lead-time to establish any
inconsistencies, and as such they are at
A lowered state of suspicion.
Social Engineering In A Networked World
Delayed Validation
The target is lulled into a sense of safety
since the attacker is not attempting to
gather any information. It is only later in the
conversation that the attacker begins to ask
some questions, usually under the guise of
getting some prep work out of the way
while they have the target on the phone.
Social Engineering In A Networked World
Delayed Validation
The lowered level of suspicion is maintained,
since the most critical part of the social
handshake comes at the beginning of the call.
Since the target has already accepted the
initial risk, and eventually established the
social connection, they usually fail to reset
their “awareness parameters” that they have in
place during theinitialinteraction.
Social Engineering In A Networked World
Elicitation Techniques
Elicitation can be a component of the
pre-text, or can be done as part of the
attack.
Amazing the information you can gain via
elicitation.
Intelligence agencies use various
methods.
Social Engineering In A Networked World
On-Site Social Engineering
Phone interactions allow them the
freedom to simply hang up with little
threat of being physically detained
Attackers are somewhat hamstrung by the
inability to visually gauge reactions from
the target, as well as a lessened level of
situational awareness.
Social Engineering In A Networked World
On-Site Social Engineering
The simple act of presenting oneself to
the target has a surprising effect:
There is an added legitimacy factor added
to thevictim’s mind. Surely nobody would
be bold enough to come onto the
premises to try to fool their way inside..
Social Engineering In A Networked World
On-Site Social Engineering
The common perception that attacks like
this only take place in spy movies and TV
shows biases most targets.
Usually reinforced by a “I would know a
scammer if I met one / it would never
happen to me” attitude.
Social Engineering In A Networked World
On-Site Social Engineering
On-site attacks that are especially effective are
those that involve the attacker presenting
himself at a facility, while referencing a worker
who is unavailable.
Sites such as FourSquare and Twitter are
remarkably effective reference points, since they
can give attackers real-time reconnaissance
information.
Social Engineering In A Networked World
On-Site Social Engineering
The attacker can make sure the reference target
is not reachable by phone via one of a few
methods.
War-faxing the reference target’s cell phone
Ensure the reference target is physically
Separated from his phone – fake job interview
Social Engineering In A Networked World
On-Site Social Engineering
When the receptionist or guardian of the site is
unable to reach the reference target, they will
either turn the attacker away, or allow them
access.
The latter is much more likely if a proper dossier
has been collected, since the attacker can drop
many reference points that infer they must be in
the company’s trust.
Social Engineering In A Networked World
On-Site Social Engineering
If the receptionist decides not to allow the
attacker in, this can often be mitigated by calmly
asking for them to call a taxi to take the attacker
back to the airport. “I’ll have to reschedule and
fly back in sometime next month.”
They usuallyerror on the side of self
preservation, or in what they mistakenly believe
to be in the best interests of the company.
Social Engineering In A Networked World
Countermeasures
There are many things that companies
can do to mitigate these threats, but they
involve much more than basic awareness
training.
Most awareness programs are sorely
lacking when it comes to training
regarding social engineering.
Social Engineering In A Networked World
Countermeasures
A very effective technique: Complement
a robust social engineering awareness
lecture with having all employees create
a dossier on a randomly assigned co
worker from social media sites.
Offer cash to make it REALLY effective!
Social Engineering In A Networked World
Countermeasures
Not only does the information gathering
process make all employees aware of the
dangers of social media, it makes them
think like attackers, and helps modify
their own online behavior.
Often this method educates others in
their social circle to the dangers…
Social Engineering In A Networked World
Countermeasures
Move away from the traditional “we won’t
ask for passwords over the phone” sort of
mindset.
• A skilled SE will never ask for a password,
since that instantly raises flags.
• Make program more around situational
awareness (excessive laughter, emotional
bonds, etc)
Social Engineering In A Networked World
Countermeasures
• Maintain a list of “hot button” questions
to flag.
• Log all SE attempts in a centralized
database
• Investigate EVERY attempt – ideally with
PhySec and InfoSec together
• SE attacks are often followed by physical,
vice versa.
Social Engineering In A Networked World
Countermeasures
• Doa social media deep dive.
• Focus on information leakage, not just
reputation!
• Know what employees are tweeting /posting
what/where/when!
• Be careful of appropriate laws – employee
monitoring.
Social Engineering In A Networked World
Countermeasures
• Password of the day/week
• Implement call-back/verification
procedures
• Train your employees that it is “okay to
say no”
• Commit to NEVER punishing employees
for erring on the side of security
Social Engineering In A Networked World
Countermeasures
TEST!
Ensure SE auditing is part of every Pen Test
Do testing quarterly
Offer cash/prizes
Social Engineering In A Networked World
THANK YOU
Christopher Hills CPP, CRMP
Vice President
Phone : +1 (425) 971-4263
Email : Chris@premierrisksolutions.com
Website : www.premierrisksolutions.com
Copyright 2015

Weitere ähnliche Inhalte

Was ist angesagt?

Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkJahangirnagar University
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917Evan Francen
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignPratum
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering TechniquesNeelu Tripathy
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
Social Engineering 101 or The Art of How You Got Owned by That Random StrangerSocial Engineering 101 or The Art of How You Got Owned by That Random Stranger
Social Engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Infosecurity2010
 
Social engineering
Social engineeringSocial engineering
Social engineeringMaulik Kotak
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 

Was ist angesagt? (20)

Social engineering
Social engineering Social engineering
Social engineering
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test CampaignInfographic: Penetration Testing - A Look into a Full Pen Test Campaign
Infographic: Penetration Testing - A Look into a Full Pen Test Campaign
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Social Engineering Techniques
Social Engineering TechniquesSocial Engineering Techniques
Social Engineering Techniques
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
Social Engineering 101 or The Art of How You Got Owned by That Random StrangerSocial Engineering 101 or The Art of How You Got Owned by That Random Stranger
Social Engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 

Andere mochten auch

Words analysis form week 4 9-12
Words analysis form week 4 9-12Words analysis form week 4 9-12
Words analysis form week 4 9-12lindarobb2
 
Word of the day
Word of the dayWord of the day
Word of the daylindarobb2
 
Word of the day 4 9-12
Word of the day 4 9-12Word of the day 4 9-12
Word of the day 4 9-12lindarobb2
 
Presentation1.pptx rebecca winter
Presentation1.pptx   rebecca winterPresentation1.pptx   rebecca winter
Presentation1.pptx rebecca winterbeccawinter
 
How to survive
How to surviveHow to survive
How to survivelindarobb2
 
Word of the day 4 23-12
Word of the day 4 23-12Word of the day 4 23-12
Word of the day 4 23-12lindarobb2
 
Word of the day
Word of the dayWord of the day
Word of the daylindarobb2
 
Empires of the sea bits
Empires of the sea bitsEmpires of the sea bits
Empires of the sea bitsmonkded
 
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékeléseTörténelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékeléseTamás Bakos
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rightslindarobb2
 
7 myths of the spanish conquest
7 myths of the spanish conquest7 myths of the spanish conquest
7 myths of the spanish conquestmonkded
 
Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1Dominique Gayraud
 
Identifier les risques
Identifier les risquesIdentifier les risques
Identifier les risquesCarine Pascal
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...MONA
 

Andere mochten auch (20)

Words analysis form week 4 9-12
Words analysis form week 4 9-12Words analysis form week 4 9-12
Words analysis form week 4 9-12
 
Word of the day
Word of the dayWord of the day
Word of the day
 
Word of the day 4 9-12
Word of the day 4 9-12Word of the day 4 9-12
Word of the day 4 9-12
 
Presentation1.pptx rebecca winter
Presentation1.pptx   rebecca winterPresentation1.pptx   rebecca winter
Presentation1.pptx rebecca winter
 
Presentation1
Presentation1Presentation1
Presentation1
 
FRESHIES Pitch
FRESHIES PitchFRESHIES Pitch
FRESHIES Pitch
 
How to survive
How to surviveHow to survive
How to survive
 
Weekly words
Weekly wordsWeekly words
Weekly words
 
Word of the day 4 23-12
Word of the day 4 23-12Word of the day 4 23-12
Word of the day 4 23-12
 
Word of the day
Word of the dayWord of the day
Word of the day
 
Empires of the sea bits
Empires of the sea bitsEmpires of the sea bits
Empires of the sea bits
 
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékeléseTörténelem 5. osztályosoknak - Interaktív tananyag értékelése
Történelem 5. osztályosoknak - Interaktív tananyag értékelése
 
Laws related to disability rights
Laws related to disability rightsLaws related to disability rights
Laws related to disability rights
 
Simple past lesson
Simple past lesson Simple past lesson
Simple past lesson
 
7 myths of the spanish conquest
7 myths of the spanish conquest7 myths of the spanish conquest
7 myths of the spanish conquest
 
Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1Archives à conserver Associations loi 1901 .compressed 1
Archives à conserver Associations loi 1901 .compressed 1
 
Identifier les risques
Identifier les risquesIdentifier les risques
Identifier les risques
 
Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2Ateliers commercants acv-ucm-acia #2
Ateliers commercants acv-ucm-acia #2
 
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 Formation "Développer son activité commerciale sur le marché du tourisme d'a... Formation "Développer son activité commerciale sur le marché du tourisme d'a...
Formation "Développer son activité commerciale sur le marché du tourisme d'a...
 
Intervention Silvère MERCIER
Intervention Silvère MERCIER Intervention Silvère MERCIER
Intervention Silvère MERCIER
 

Ähnlich wie Social Engineering Risks and Countermeasures

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social EngineeringVarunjeet Singh Rekhi
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringJack Kessler
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPNIC
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptShivaniSingha1
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 

Ähnlich wie Social Engineering Risks and Countermeasures (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Social Engineering.pdf
Social Engineering.pdfSocial Engineering.pdf
Social Engineering.pdf
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
APEC TEL 58: Social Media Security
APEC TEL 58: Social Media SecurityAPEC TEL 58: Social Media Security
APEC TEL 58: Social Media Security
 
ethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.pptethical hacking in motion MODULE - II.ppt
ethical hacking in motion MODULE - II.ppt
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 

Kürzlich hochgeladen

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportMintel Group
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 

Kürzlich hochgeladen (20)

India Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample ReportIndia Consumer 2024 Redacted Sample Report
India Consumer 2024 Redacted Sample Report
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 

Social Engineering Risks and Countermeasures

  • 1. Social Engineering In A Networked World Social engineering risk overview and counter measures
  • 2. Social Engineering In A Networked World What is Social Engineering? An interpersonal interaction in which one person (attacker) manipulates the other part(ies) into revealing information they shouldn’t or performing a task which the attacker desires.
  • 3. What is Social Engineering? Phishing is NOT social engineering. It is a tool used by social engineers. Big difference! If no interpersonal communications are involved, It’s NOT social engineering. Can be phone call or in person. NOT email. If it can be automated, it’s not social Engineering. Social Engineering In A Networked World
  • 4. Famous (Recent) SE Incidents: White House Hack Anonymous Mat Honan Coca-Cola AT&T Ugnazi Social Engineering In A Networked World
  • 5. Identification Best targets: • Business resources • Social media • Government filings Groups in turmoil usually yield: • Disgruntled/alienated employees • W/layoffs current/past employees open to bribery/malicious intent • With staff churn much easier to insert “new employee” Social Engineering In A Networked World
  • 6. Social Engineering In A Networked World The Attack • Identify the targets • Create the dossier / perform OSINT recon Launch the attack – “social handshake” • Create PST • Profit Social Engineering In A Networked World
  • 7. Social Engineering In A Networked World The Dossier Critical to the success of creating a PST Purpose is to generate either actionable intelligence, or create a repository of Data to use in “push polling” Example: Here Social Engineering In A Networked World
  • 8. Social Engineering In A Networked World The Dossier To create the PST we target: • Company • Employees • Contractors • Suppliers • Competitors Social Engineering In A Networked World
  • 9. Company Flags: • Physical plant • Security systems • Internal lingo • Computer/phone systems • Operational information • Competitors • Voicemail/phone directory enumeration • Dumpster diving • Lobby Surfing (Lunch groups) Social Engineering In A Networked World
  • 10. LobbySurfing: • Vendor/client/employee names (sign-in sheet/“welcome visitor” lobby signs) • Employee names, positions and home addresses (magazine labels) • General assessment of overall security posture (are cameras present? PTZ/fixed? Are proximity cards orbiometrics in use? Guards? Is piggybacking allowed?). Social Engineering In A Networked World
  • 11. Ask and Ye Shall Receive! Want some hard to get / esoteric information about a company? ASK for it (or ASK.com for it) or get on one of the employee social advice networks. Social Engineering In A Networked World
  • 12. Social Engineering In A Networked World
  • 13. Social Engineering In A Networked World
  • 14. Social Engineering In A Networked World
  • 15. Social Engineering In A Networked World The Dossier To create the PST we target: • Company • Employees • Contractors • Suppliers • Competitors
  • 16. Employee Flags • Interests (political, sports) • Common hangouts (4Square) • Religion • Pets / Relatives (password cracking) • Open to “relationship” (single) • Open to blackmail (dating sites, illicit sites) • Open to bribery • Open to phishing (sophistication) Social Engineering In A Networked World
  • 17. Employee Data • Spokeo • Flickr (Metadata) • LinkedIn • Facebook • Home address – networks/property vulnerable to penetration Social Engineering In A Networked World
  • 18. Social Networks We beat this one to death, for good reason: Social networks are an OSINT goldmine! FourSquare not only gives you realtime geolocation of a target (not to mention “tips” and a person’s history of attendance)… Social Engineering In A Networked World
  • 19. What is Social Engineering? • Operating System • Type of AV • Program used to open PDF’s • Word processing, spreadsheet software • Internet browser used • Email client All important pieces of information. Social Engineering In A Networked World
  • 20. Social Engineering In A Networked World The Dossier To create the PST we target: • Company • Employees • Contractors • Suppliers • Competitors Social Engineering In A Networked World
  • 21. Contractors • Technicalcontractors (programmers, IT personnel) • Janitorial service • Security guards • Alarm company • HVAC All have physical or logical access Social Engineering In A Networked World
  • 22. Social Engineering In A Networked World The Dossier To create the PST we target: • Company • Employees • Contractors • Suppliers • Competitors Social Engineering In A Networked World
  • 23. Suppliers Often the easiest to manipulate. • Security appliance manufacturers • Security software • Managed services • Alarm company Contact the security appliance vendor posing as the new POC. Social Engineering In A Networked World
  • 24. Social Engineering In A Networked World The Dossier To create the PST we target: • Company • Employees • Contractors • Suppliers • Competitors Social Engineering In A Networked World
  • 25. Competitors Couched properly, probing competitors can yield great results. The competitor to the target will freely give you information concerning their rivals in the marketplace. Competitorswill often maintain their own dossiers on the target Social Engineering In A Networked World
  • 26. Great OSINT sources: ASK.com Blogspot LinkedIn Cnet forums Data Center Knowledge Gov’t sites Indeed.com Information Week Cityfreq Facebook Flickr FourSquare Glassdoor Google & Bing MySpace Pipl/PlaxoQuora Reddit Spokeo TinEye Maltego FOCA Twitter YahooAnswers Social Engineering In A Networked World
  • 27. The Social Handshake The presentation of the pretext to the target Efficacy lift can be gained via: • Push polling (information gleaned by OSINT or observation) • Psychological gambits (humor/sympathy) • Trust transference (using an established social handshake to gain trust of another) • Authority-based pre-texts Social Engineering In A Networked World
  • 28. The Social Handshake The most critical part of a successful SE attack Occurs during the initial interaction between the attacker and the victim Establishing this initial connection is not nearly As difficult as one might think… Social Engineering In A Networked World
  • 29. The Social Handshake In fact, past history has shown that intelligence agents have an over 80% success rate with establishing a connection over the phones with targets with extremely basic introductions, such as asking “can I have a few minutes of your time?” Social Engineering In A Networked World
  • 30. The PST Persistent Social Threat • An ongoing social relationship that can last for years • Targeted for their access/knowledge • Not used in low-level / attacks / one-off’s • Don’t use them (normally) directly for network attacks • Want to avoid “burning” them Social Engineering In A Networked World
  • 31. The PST Incredibly devastating to an enterprise because: • Not detectable via firewall logs • Not blocked by anti-virus solutions • The duped target is not likely to come forward and reveal themselves if attack is uncovered Social Engineering In A Networked World
  • 32. What is Social Engineering? An interpersonal interaction in which one person (attacker) manipulates the other part(ies) into revealing information they shouldn’t or performing a task which the attacker desires. Social Engineering In A Networked World
  • 33. What is Social Engineering? An interpersonal interaction in which one person (attacker) manipulates the other part(ies) into revealing information they shouldn’t or performing a task which the attacker desires. Social Engineering In A Networked World
  • 34. Why Does It Work? An effective social engineer exploits common psychological weaknesses. Humans are inefficient at detecting deception, on average only detecting deception correctly in 54% of interactions Social Engineering In A Networked World
  • 35. Why Does It Work? Most people rely on inaccurate methods such as eye contact and body languages that are not reflected in reality. As such, an effective attacker will maintain eye contact when telling critical lies, or avert eye contact when they want their target to think they are lying. Social Engineering In A Networked World
  • 36. Successful Pretext Pre-Text: The “story” the attacker tells. A successful pretext is often driven bythe end data points that the attacker desires to gather. Social Engineering In A Networked World
  • 37. Delayed Validation The attacker contacts the target and informs them that they will be coming on-site in the near future and that the call is to introduce himself and the purpose of the visit. This method is very effective since the attacker at first does not attempt to elicit any information, Just to set the date. Social Engineering In A Networked World
  • 38. Delayed Validation Aker small talk, attacker asks for hotel recommendations, tourist attractions,etc. As this is happening, the target subconsciously at ease, since they think they will have lead-time to establish any inconsistencies, and as such they are at A lowered state of suspicion. Social Engineering In A Networked World
  • 39. Delayed Validation The target is lulled into a sense of safety since the attacker is not attempting to gather any information. It is only later in the conversation that the attacker begins to ask some questions, usually under the guise of getting some prep work out of the way while they have the target on the phone. Social Engineering In A Networked World
  • 40. Delayed Validation The lowered level of suspicion is maintained, since the most critical part of the social handshake comes at the beginning of the call. Since the target has already accepted the initial risk, and eventually established the social connection, they usually fail to reset their “awareness parameters” that they have in place during theinitialinteraction. Social Engineering In A Networked World
  • 41. Elicitation Techniques Elicitation can be a component of the pre-text, or can be done as part of the attack. Amazing the information you can gain via elicitation. Intelligence agencies use various methods. Social Engineering In A Networked World
  • 42. On-Site Social Engineering Phone interactions allow them the freedom to simply hang up with little threat of being physically detained Attackers are somewhat hamstrung by the inability to visually gauge reactions from the target, as well as a lessened level of situational awareness. Social Engineering In A Networked World
  • 43. On-Site Social Engineering The simple act of presenting oneself to the target has a surprising effect: There is an added legitimacy factor added to thevictim’s mind. Surely nobody would be bold enough to come onto the premises to try to fool their way inside.. Social Engineering In A Networked World
  • 44. On-Site Social Engineering The common perception that attacks like this only take place in spy movies and TV shows biases most targets. Usually reinforced by a “I would know a scammer if I met one / it would never happen to me” attitude. Social Engineering In A Networked World
  • 45. On-Site Social Engineering On-site attacks that are especially effective are those that involve the attacker presenting himself at a facility, while referencing a worker who is unavailable. Sites such as FourSquare and Twitter are remarkably effective reference points, since they can give attackers real-time reconnaissance information. Social Engineering In A Networked World
  • 46. On-Site Social Engineering The attacker can make sure the reference target is not reachable by phone via one of a few methods. War-faxing the reference target’s cell phone Ensure the reference target is physically Separated from his phone – fake job interview Social Engineering In A Networked World
  • 47. On-Site Social Engineering When the receptionist or guardian of the site is unable to reach the reference target, they will either turn the attacker away, or allow them access. The latter is much more likely if a proper dossier has been collected, since the attacker can drop many reference points that infer they must be in the company’s trust. Social Engineering In A Networked World
  • 48. On-Site Social Engineering If the receptionist decides not to allow the attacker in, this can often be mitigated by calmly asking for them to call a taxi to take the attacker back to the airport. “I’ll have to reschedule and fly back in sometime next month.” They usuallyerror on the side of self preservation, or in what they mistakenly believe to be in the best interests of the company. Social Engineering In A Networked World
  • 49. Countermeasures There are many things that companies can do to mitigate these threats, but they involve much more than basic awareness training. Most awareness programs are sorely lacking when it comes to training regarding social engineering. Social Engineering In A Networked World
  • 50. Countermeasures A very effective technique: Complement a robust social engineering awareness lecture with having all employees create a dossier on a randomly assigned co worker from social media sites. Offer cash to make it REALLY effective! Social Engineering In A Networked World
  • 51. Countermeasures Not only does the information gathering process make all employees aware of the dangers of social media, it makes them think like attackers, and helps modify their own online behavior. Often this method educates others in their social circle to the dangers… Social Engineering In A Networked World
  • 52. Countermeasures Move away from the traditional “we won’t ask for passwords over the phone” sort of mindset. • A skilled SE will never ask for a password, since that instantly raises flags. • Make program more around situational awareness (excessive laughter, emotional bonds, etc) Social Engineering In A Networked World
  • 53. Countermeasures • Maintain a list of “hot button” questions to flag. • Log all SE attempts in a centralized database • Investigate EVERY attempt – ideally with PhySec and InfoSec together • SE attacks are often followed by physical, vice versa. Social Engineering In A Networked World
  • 54. Countermeasures • Doa social media deep dive. • Focus on information leakage, not just reputation! • Know what employees are tweeting /posting what/where/when! • Be careful of appropriate laws – employee monitoring. Social Engineering In A Networked World
  • 55. Countermeasures • Password of the day/week • Implement call-back/verification procedures • Train your employees that it is “okay to say no” • Commit to NEVER punishing employees for erring on the side of security Social Engineering In A Networked World
  • 56. Countermeasures TEST! Ensure SE auditing is part of every Pen Test Do testing quarterly Offer cash/prizes Social Engineering In A Networked World
  • 57. THANK YOU Christopher Hills CPP, CRMP Vice President Phone : +1 (425) 971-4263 Email : Chris@premierrisksolutions.com Website : www.premierrisksolutions.com Copyright 2015