Social Engineering
Social Engineering
Abstract
There are several techniques available to a hacker for breaching the Information
Security defenses of an organization. The human approach often termed ‘Social
Engineering’ and is probably the most difficult one to be dealt with. This paper describes
Social Engineering, common techniques used and its impact to the organization. It
discusses various forms of Social Engineering, and how they exploit common human
behavior. The document highlights ways and means to counter these attacks, and also
emphasizes on the importance of policy enforcement and user education in mitigating
the risks posed by Social Engineering.
Prepared by:
Ashish Thapar
CISSP # 106841
Whitepaper on ‘Social Engineering - An attack vector most intricate to tackle!’
Introduction
As technical attacks on systems have increased, so have numerous technology based
countermeasures being used successfully to thwart them. As a result, attackers are
shifting their focus and are increasingly targeting people through the use of social
engineering methods, often gaining unnoticed access to computer systems and sensitive
data. This is due to the widely accepted fact that People are the ‘weakest links’ in a
security framework. In the era of laws and legislations such as SOX (Sarbanes-Oxley),
GLBA (Gramm-Leach-Bliley Act), HIPAA (Health Insurance Portability and Accountability
Act) and more, it becomes imperative for everyone to prepare, defend and react to these
attacks.
Key Challenges
Despite the humungous security threat posed by Social Engineering, very little is ever
highlighted about it. Primary reason for the lack of discussion about Social Engineering
can be attributed to shame. Most people see Social Engineering as an attack on their
intelligence and wit, and no one wants to be considered ignorant or dumb to have been
duped. This is why Social Engineering gets hidden in the closet as a "taboo" subject,
whereas the fact is that no matter who a person is, he / she may be susceptible to a
Social Engineering attack.
Social engineering is still the most effective and probably the easiest method of getting
around security obstacles. Sign of a truly successful social engineer is that, they extract
information without raising any suspicion as to what they are doing.
Reverse Social Engineering on the other hand, describes a situation in which the
target itself makes the initial approach and offers hacker, the information that they want.
Such a scenario may seem unlikely, but figures of authority - particularly technical or
social authority - often receive vital personal information, such as user IDs and
passwords, because they are above suspicion. In this ‘cake-walk’ scenario for a hacker,
the victims themselves reveal information or provide the access, without someone trying
to manipulate them.
Phishing
This term applies to an email appearing to have come from a legitimate business, a
bank, or credit card company requesting "verification" of information and warning of
some dire consequences if it is not done. The letter usually contains a link to a
fraudulent web page that looks legitimate with company logos and content and has a
form that may request username, passwords, card numbers or pin details.
Vishing
It is the practice of leveraging Voice over Internet Protocol (VoIP) technology to trick
private personal and financial information from the public for the purpose of financial
reward. This term is a combination of "voice" and phishing. Vishing exploits the public's
trust in landline telephone services, which have traditionally terminated in physical
locations which are known to the telephone company, and associated with a bill-payer.
However, with the advent of VoIP, telephone services may now terminate in computers,
which are far more susceptible to fraudulent attacks than traditional "dumb" telephony
endpoints.
Spam Mails
E-mails that offer friendships, diversion, gifts and various free pictures and information
take advantage of the anonymity and camaraderie of the Internet to plant malicious
code. The employee opens e-mails and attachments through which Trojans, Viruses and
Worms and other uninvited programs find their way into systems and networks. He or
she is motivated to open the message because it appears to offer useful information,
such as security notices or verification of a purchase, promises an entertaining
diversion, such as jokes, gossip, cartoons or photographs, give away something for
nothing, such as music, videos or software downloads. The outcome can range in
severity from nuisance to system slow-down, destruction of entire communication
systems or corruption of records.
Popup Window
The attacker’s rogue program generates a pop up window, saying that the application
connectivity was dropped due to network problems, and now the user needs to reenter
his id and password to continue with his session. The unsuspecting user promptly does
as requested, because he wishes to continue working, and forgets about it. Later it is
heard that there has been an attack on the system, but it never realized that that he /
she was the one who opened the gate!
Interesting Software
In this case the victim is convinced to download and install a very useful program or
application which might be ‘window dressed’ as a CPU performance enhancer, a great
Dumpster Diving
Seldom would someone think that throwing away junk mail or a routine company
document without shredding could be a risk. However, that is exactly what it could be, if
the junk mail contained personal identification information, or credit card offers that a
‘dumpster diver’ could use in carrying out identity theft. The unsuspecting ‘trash thrower’
could give the Dumpster Diver his break. Company phone books, organization charts
and locations of employees, especially management level employees who can be
impersonated to the hacker’s benefit. Unshredded procedure and policy manuals can
help the hacker to become knowledgeable about the company’s policies and
procedures, and thus be able to convince the victim about their authenticity. The hacker
can use a sheet of paper with the company letterhead to create official looking
correspondence. A hacker can retrieve confidential information from the hard disk of a
computer as there are numerous ways to retrieve information from disks, even if the user
thinks the data has been ‘deleted’ from the disk.
Support Staff
Here a hacker may pose as a member of a facility support staff and do the trick. A man
dressed like the cleaning crew, walks into the work area, carrying cleaning equipment. In
the process of appearing to clean your desk area, he can snoop around and get valuable
information – such as passwords, or a confidential file that you have forgotten to lock up,
or make a phone call impersonating you from your desk. Or take the case of the
deceptive telephone repairman. The intruder can pose as a repairman and walk up to
your phone and fiddle around with the instrument, and the wiring etc, and in the process
spy on your workplace for valuable information that has been left unsecured.
Hoaxing
A hoax is an attempt to trick an audience into believing that something false is real.
Unlike a fraud or con (which is usually aimed at a single victim and are made for illicit
financial or material gain), a hoax is often perpetrated as a practical joke, to cause
embarrassment, or to provoke social change by making people aware of something. It
also may lead to sudden decisions being taken due to fear of an untoward incident.
Authoritative Voice
The attacker can call up the company’s computer help desk and pretend to have trouble
accessing the system. He / she claims to be in a very big hurry, and needs his password
reset immediately and demands to know the password over the phone. If the attacker
adds credence to his / her story with information that has been picked up from other
social engineering methods, the help desk personnel is all the more likely to believe the
story and do as requested.
Risk Assessment
Risk Assessment is a systematic approach that helps management in understanding the
risk factors that may adversely affect the organization’s operational capabilities. It also
helps in making ‘informed decisions’ about the extent of actions required to mitigate the
risk. It involves prioritizing of Information Assets on the basis of risk associated with
them. This helps in identification of most critical assets in the organization and focusing
organization’s energy and effort in protecting the same. If risk assessment is effectively
carried out in an organization, the controls and safety procedures shall protect the most
crucial asset against attacks.
policy compliance verification. Audit procedures must be in place, to verify for example
that the help desk person is not communicating passwords over the phone or via
unencrypted email. Periodically Managers should review the access of their employees.
Security audits should confirm that employees who no longer need access do not have
access. Access points such as entry doors etc should be routinely monitored. This will
ensure that employees are complying with policy regarding access to secured locations.
Employee workspaces should undergo random inspection to ensure that confidential
material is always secured in locked cabinets. Workstations should be locked down and
password protected screensavers should be in use.
Identity Management
It is important for organizations to have a unique identifier for each employee. This is
often used as their ID to access all computer systems, and also as the key identifier for
the individual in the organization. However, keeping the base for personnel identification
distinct from that used for computer systems can mitigate this risk. It may lead to some
additional work, but it will surely help to limit the damage from an attack.
Operating Procedures
Standard operating procedures, especially those related to providing security access or
clearance, should have a cross verification or ‘call back’ step before the request is
granted. This will reduce the number of times the hacker can get away with trying to
impersonate a legitimate user.
Insurance Protection
Finally, an organization can buy insurance against security attacks. However, most
insurers will look for company policies and procedures that work towards reducing the
threat of attacks. Generally, insurers are not so much bothered with the security
products an organization is using to mitigate attacks as compared to the focus on
employee awareness, logical, physical & administrative access controls and security
policies put in place.
References:
http://www.microsoft.com/technet/security/midsizebusiness/topics/complianceandpolicie
s/socialengineeringthreats.mspx
http://en.wikipedia.org/wiki/Social_engineering_%28security%29
http://en.wikipedia.org/wiki/Dumpster_diving
http://www.cisco.com/web/about/security/intelligence/mysdn-social-engineering.html
http://www.windowsecurity.com/articles/Social_Engineers.html
http://www.gartner.com/gc/webletter/security/issue1/article1.html
www.cert-in.org.in