SlideShare a Scribd company logo
Defeating Social
Engineering, BECs, &
Phishing
Rob Ragan
@sweepthatleg | Alex DeFreese
@lunarca_
We are Rob and Alex
Security consultants at Bishop Fox.
We help organizations secure their networks,
applications, and people.
Hello!
Trap the
Phisherman
Trap the
Phisherman
Lure attackers into traps that betray their presence
Trap the
Phisherman
Lure attackers into traps that betray their presence
Trigger rapid incident response
Warning:
No Silver Bullets
Email Phishing 101
Email phishing was the first step in
91% of data breaches in 2016
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
The Anatomy of an
Attack
• Find Targets
• Create Payload
• Deliver Attack
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Email Address
Formats
• example.user@company.com
• euser@company.com
• user.example@company.com
• example.m.user@company.com
Attack Payload
• Compromise Accounts and Credentials
• Compromise Computers
• Perform an Action
$
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Deliver Attack
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Link to Attack Site
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Business Email Compromise
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
• Business Working with a Foreign Supplier
• Business Executive Receiving or Initiating a Request for a Wire
Transfer
• Business Contacts Receiving Fraudulent Correspondence
through Compromised E-mail
• Data Theft
• Business Executive and Attorney Impersonation
https://www.ic3.gov/media/2017/170504.aspx
Most Common BEC Scenarios
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
• Business Working with a Foreign Supplier
• Business Executive Receiving or Initiating a Request for a Wire
Transfer
• Business Contacts Receiving Fraudulent Correspondence
through Compromised E-mail
• Data Theft
• Business Executive and Attorney Impersonation
https://www.ic3.gov/media/2017/170504.aspx
Most Common BEC Scenarios
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
• Clearly-defined process for financial transactions
• Out-of-band verification for transactions beyond a threshold
• Multi-factor authentication
Mitigation Strategies
Event of the Year
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
“
“
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Common Ineffectual Techniques
What Doesn’t
Work
Excessive Awareness Training1.
Not useless
• Reduce attack surface
• Improve detection rates
“
But it’s nowhere near enough
on its own
It only takes one
Punishing User Mistakes2.
Social engineering attacks will always
succeed without technical controls
for defense
• Helpful
• Naïve
• Trusting
• Routine-oriented
Because people are…
Not security experts
Because people are…
And they shouldn’t have to be
Limit Delivery Options
Email Protections
v=spf1 include:spf.protection.outlook.com
include:mailgun.org -all
v=DMARC1; p=reject; pct=100;
rua=mailto:re+mlszd9zhq4y@dmarc.postmarkapp.com; aspf=r;
SPF
DMARC
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Mark External Emails
http://blogs.perficient.com/microsoft/2016/04/office-365-providing-your-users-visual-cues-about-email-safety/
Set up Canary Emails
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Limit Payload Options
Block Unknown Executables
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Block at First Sight
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Block Office Macros
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
https://blogs.technet.microsoft.com/mmpc/2016/03/22/new-feature-in-office-
2016-can-block-macros-and-help-prevent-infection/
Limit Access to PowerShell
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
https://blogs.technet.microsoft.com/mmpc/2016/10/19/the-new-lnk-between-spam-and-locky-infection/
Multi-Factor Authentication
Image: Duo Security
Password Manager
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Refuser
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Incident Response
Tailored
Incident Response Plan
• Identify the most common threats facing your company
• Define and enforce incident response plans for these threats
Detect
Use your Employees
It still only
takes one
mailto:phishing@bishopfox.com
http://www.nerdosaur.com/network-security/add-a-report-phishing-button-in-outlook/
Domain Protections
• DNS RPZ
• Automate redirection of known-bad domains
• Redirect DNS Homoglyphs
• Tripwire to alert on attacks in progress
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Contain
Identify Compromised Targets
Force Password Resets
Eradicate
Revert to Known-
Good Backup
• Getting around persistence is hard and not
worth it
• Difficult to tell if its actually eradicated
Burn Payload
Infrastructure
• Break Command and Control channels
• Blacklist server IP addresses and DNS names
• Buy time to respond
• Make attackers spend money
Burn Delivery
Infrastructure
• Block emails from attacking MTA
• Prevent further attacks from that server
• Make attackers spend money
Raise the alarm
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Any questions ?
You can find us at:
• @bishopfox
• facebook.com/bishopfoxconsulting
• linkedin.com/company/bishop-fox
• google.com/+bishopfox
Thanks!
CREDITS
Christina Camilleri (@0xkitty) for the slide design!

More Related Content

PDF
Social Engineering: the Bad, Better, and Best Incident Response Plans
PPTX
Social Engineering
PDF
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
PDF
Social Engineering
PDF
Social engineering attacks
PPTX
Social engineering-Attack of the Human Behavior
PPTX
Social Engineering Techniques
PPTX
Social engineering presentation
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs U...
Social Engineering
Social engineering attacks
Social engineering-Attack of the Human Behavior
Social Engineering Techniques
Social engineering presentation

What's hot (20)

PPTX
The Art of Human Hacking : Social Engineering
PDF
Social engineering by-rakesh-nagekar
PDF
Social Engineering
PPT
Social Engineering
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPTX
Social Engineering and What to do About it
PPTX
Hackers
PPTX
Social engineering
PPTX
Social engineering
PPTX
social engineering
PPTX
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
PPTX
Social engineering: A Human Hacking Framework
PPTX
Cybersecurity Awareness
PDF
Why is cybersecurity important for the entertainment industry
PPTX
PDF
Hackingppt 160730081605
PDF
14 tips to increase cybersecurity awareness
PPTX
Social Engineering
PDF
The Anatomy of a Data Breach
PDF
Cyber security-awareness-for-social-media-users - Devsena Mishra
The Art of Human Hacking : Social Engineering
Social engineering by-rakesh-nagekar
Social Engineering
Social Engineering
Presentation of Social Engineering - The Art of Human Hacking
Social Engineering and What to do About it
Hackers
Social engineering
Social engineering
social engineering
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Social engineering: A Human Hacking Framework
Cybersecurity Awareness
Why is cybersecurity important for the entertainment industry
Hackingppt 160730081605
14 tips to increase cybersecurity awareness
Social Engineering
The Anatomy of a Data Breach
Cyber security-awareness-for-social-media-users - Devsena Mishra
Ad

Similar to Interop 2017 - Defeating Social Engineering, BEC, and Phishing (20)

PDF
Defeating Social Engineering, BECs & Phishing
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
PPTX
Head in the Clouds, Feet on the Ground
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
DOCX
Article1DISCUSSION_1Information security within an organi
PPTX
How I Will Phish You
PPTX
Cybersecurity: How Safe Is Your Organization?
PPTX
5 Network Security Threats Facing Businesses Today
PPTX
Cyber Frontline - Level 1 - Module 2.pptx
PPTX
Email: still the favourite route of attack
PDF
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PPTX
3 Tips to Stay Safe Online in 2017
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PPTX
2024 Security Outlook & Essential Security Practices
PDF
Introduction to the Current Threat Landscape
PDF
Malware Attacks | How To Defend Organizations From It?
PPTX
Cyber Security and prevention Presentation.pptx
Defeating Social Engineering, BECs & Phishing
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Using Return Path Data to Protect Your Brand: Security Breakout Session - NYC
Using Return Path Data to Protect Your Brand: Security Breakout Session - San...
Head in the Clouds, Feet on the Ground
Using Return Path Data to Protect Your Brand: Security Breakout Session - LA
Article1DISCUSSION_1Information security within an organi
How I Will Phish You
Cybersecurity: How Safe Is Your Organization?
5 Network Security Threats Facing Businesses Today
Cyber Frontline - Level 1 - Module 2.pptx
Email: still the favourite route of attack
Using Return Path Data to Protect Your Brand: Security Breakout Session - London
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
3 Tips to Stay Safe Online in 2017
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
2024 Security Outlook & Essential Security Practices
Introduction to the Current Threat Landscape
Malware Attacks | How To Defend Organizations From It?
Cyber Security and prevention Presentation.pptx
Ad

More from Rob Ragan (12)

PPTX
Nbt hacker fight
PDF
Expose Yourself Without Insecurity: Cloud Breach Patterns
PPTX
DeadDropSF - Better Red Than Dead
PDF
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
PDF
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
PDF
Tenacious Diggity - Skinny Dippin in a Sea of Bing
PDF
Attack Chaining: Advanced Maneuvers for Hack Fu
PDF
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
PDF
Lord of the Bing - Black Hat USA 2010
PPT
Filter Evasion: Houdini on the Wire
PPT
Static Analysis: The Art of Fighting without Fighting
PPT
Intro to Web Application Security
Nbt hacker fight
Expose Yourself Without Insecurity: Cloud Breach Patterns
DeadDropSF - Better Red Than Dead
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Attack Chaining: Advanced Maneuvers for Hack Fu
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Lord of the Bing - Black Hat USA 2010
Filter Evasion: Houdini on the Wire
Static Analysis: The Art of Fighting without Fighting
Intro to Web Application Security

Recently uploaded (20)

PDF
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
KodekX | Application Modernization Development
PDF
Advanced IT Governance
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
How Onsite IT Support Drives Business Efficiency, Security, and Growth.pdf
Advanced Soft Computing BINUS July 2025.pdf
Modernizing your data center with Dell and AMD
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Telecom Fraud Prevention Guide | Hyperlink InfoSystem
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Sensors and Actuators in IoT Systems using pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
KodekX | Application Modernization Development
Advanced IT Governance
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Diabetes mellitus diagnosis method based random forest with bat algorithm
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Per capita expenditure prediction using model stacking based on satellite ima...

Interop 2017 - Defeating Social Engineering, BEC, and Phishing