What is social engineering(1)
What is social engineering(1)
Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological manipulation
to trick users into making security mistakes or giving away sensitive
information.
Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s
greed or curiosity. They lure users into a trap that steals their personal
information or inflicts their systems with malware.
The most reviled form of baiting uses physical media to disperse malware.
For example, attackers leave the bait—typically malware-infected flash
drives—in conspicuous areas where potential victims are certain to see them
(e.g., bathrooms, elevators, the parking lot of a targeted company). The bait
has an authentic look to it, such as a label presenting it as the company’s
payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home
computer, resulting in automatic malware installation on the system.
Baiting scams don’t necessarily have to be carried out in the physical world.
Online forms of baiting consist of enticing ads that lead to malicious sites or
that encourage users to download a malware-infected application.
Scareware
Scareware involves victims being bombarded with false alarms and fictitious
threats. Users are deceived to think their system is infected with malware,
prompting them to install software that has no real benefit (other than for the
perpetrator) or is malware itself. Scareware is also referred to as deception
software, rogue scanner software and fraudware.
Scareware is also distributed via spam email that doles out bogus warnings,
or makes offers for users to buy worthless/harmful services.
Pretexting
Here an attacker obtains information through a series of cleverly crafted lies.
The scam is often initiated by a perpetrator pretending to need sensitive
information from a victim so as to perform a critical task.
All sorts of pertinent information and records is gathered using this scam,
such as social security numbers, personal addresses and phone numbers,
phone records, staff vacation dates, bank records and even security
information related to a physical plant.
Phishing
As one of the most popular social engineering attack types, phishing scams
are email and text message campaigns aimed at creating a sense of urgency,
curiosity or fear in victims. It then prods them into revealing sensitive
information, clicking on links to malicious websites, or opening attachments
that contain malware.
Spear phishing
This is a more targeted version of the phishing scam whereby an attacker
chooses specific individuals or enterprises. They then tailor their messages
based on characteristics, job positions, and contacts belonging to their
victims to make their attack less conspicuous. Spear phishing requires much
more effort on behalf of the perpetrator and may take weeks and months to
pull off. They’re much harder to detect and have better success rates if done
skillfully.
Moreover, the following tips can help improve your vigilance in relation to
social engineering hacks.
Don’t open emails and attachments from suspicious sources – If you don’t
know the sender in question, you don’t need to answer an email. Even if you
do know them and are suspicious about their message, cross-check and
confirm the news from other sources, such as via telephone or directly from a
service provider’s site. Remember that email addresses are spoofed all of the
time; even an email purportedly coming from a trusted source may have
actually been initiated by an attacker.
Use multifactor authentication – One of the most valuable pieces of
information attackers seek are user credentials. Using multifactor
authentication helps ensure your account’s protection in the event of system
compromise. Imperva Login Protect is an easy-to-deploy 2FA solution that
can increase account security for your applications.
Be wary of tempting offers – If an offer sounds too enticing, think twice
before accepting it as fact. Googling the topic can help you quickly determine
whether you’re dealing with a legitimate offer or a trap.
Keep your antivirus/antimalware software updated – Make sure automatic
updates are engaged, or make it a habit to download the latest signatures first
thing each day. Periodically check to make sure that the updates have been
applied, and scan your system for possible infections.
Definition
Social engineering in IT
This entry will cover some of the most common techniques: pretexting,
baiting, quid pro quo and tailgating. Phishing attacks also rely upon social
engineering; this topic has been covered in a previous
entry: Phishing/Spear phishing.
Pretexting
Example: the attacker claims to work for IT support and requests the
target's password for maintenance purposes.
Example: a USB flash drive infected with a keylogger and labelled "My
private pics" left on the victim's doorstep.
Quid Pro Quo, "something for something" in Latin, involves a request for
information in exchange for a compensation.
Quid pro quo attacks are relatively easy to detect given the asymmetrical
value of the information compared to the compensation, which is opposite
for the attacker and the victim. In these cases the best countermeasure
remains the victim integrity and ability to identify, ignore and report.
Tailgating
Any organisation should identify its critical assets and implement the
appropriate security policies and protocols. When necessary, these should
be reinforced through the use of technology.
To conclude
Social Engineering is becoming an increasingly effective method for
cybercriminals to breach an organization’s security measures. It is vital
that your organization implements the appropriate defenses that
include but isn’t limited to the above eight precautions, to prevent social
engineering attacks. StickmanCyber's team is equipped to help your
employees recognise such attempts, and prevent social engineering
attacks.