SlideShare una empresa de Scribd logo
1 de 14
You may not be aware that there is a scale of seven deadly
vices connected to social engineering. The deadliest social
engineering attacks are the ones that have the highest
success rates, often approaching 100%.
What is the secret of these attacks, how come they
succeed so well?
Your own observations show you that people are very
different. Some are always enthusiastic and willing to learn
something new. Others are more conservative but
courteous to their co-workers.
A bit further down this scale are people that always looks
like they are bored with life and then at the bottom are
those who just don't care and basically are in apathy about
everything.
Successful social engineers first determine where their
target is on this scale, and then select an attack that will
have the highest degree of success with that person, trying
to closely match their target's look on life.
This scale of vices can be approached from either a
negative or positive side. You can either call it gullibility or
you can call it trust, call it greed or self-interest, but since
we're talking vices here we'll stick to the negative labels.
Here are seven social engineering attacks that I hope are a
good example of each one of the deadly vices, but note
there is always overlap and things are not that clear-cut.
We are dealing with humans after all!
Curiosity:
The attacker left a USB stick next to the washing basin in
the restroom of the floor that had the executive offices and
their administrative assistants. It was clearly marked 'Q1
Salary Updates'.
The USB drive had modified malware on it that installed
itself and called home from any workstation it was plugged
into. This attack was 90% effective.
1
Courtesy:
The attacker focused in on the CEO of his target company.
He did his research, found the CEO had a relative battling
cancer and was active in an anti-cancer charity. The
attacker spoofed someone from the charity, asked the CEO
for his feedback on a fund-raising campaign and attached
an infected PDF.
Mission achieved, the CEO's PC was owned and the
network followed shortly after. And of course holding the
door open for a stranger with his hands full of boxes is a
classic 'Courtesy' piggybacking example that we all know.
2
Gullibility:
Attackers identified the proper managers at two separate
branches of their targeted bank. They bought a domain
name that looked very similar to the bank's domain.
They spoofed the bank exec's emails and sent bogus
emails to the manager authorizing transaction. They
walked in with a counterfeit check and a fake driver's
license, and walked out with 25,000 in cash...repeatedly!
3
Greed:
Did you know that the Nigerian 419 scams these days use
the word 'Nigeria' on purpose to qualify their targets up
front?
It's now utilized as a filter to weed out people and grab the
uneducated ones that are greedy enough to take a risk and
answer the 26 year old orphan girl that has $12,500,000 in
the bank, needs a guardian and some help transferring the
funds...
4
Thoughtlessness:
The combined U.S. and Israeli intelligence arms created
the Stuxnet malware which sabotaged Iran's Natanz
uranium enrichment centrifuges. It was carried in via a
simple USB attack on one of their scientists.
The Mossad slipped a USB drive to the scientist who
plugged the stick in his laptop at his house, went to work
and there connected the laptop to the internal Natanz
network. Social Engineering jumped the air-gap due to a
scientist who should have known better.
5
Shyness:
A Brad Pitt look-alike walks up to the internal reception of
the Human Resources Department of a French
multinational's Boston office. He profusely apologizes for
being a few minutes late and shows a piece of paper with
coffee stains. He explains he spilled coffee over his resume
and if the receptionist "pretty please with sugar" can print a
fresh copy for his interview?
He hands over the USB drive, the shy receptionist does not
confront him with the company policy that no foreign
devices are allowed on the network, quickly prints a new
copy and hands him the stick back. The young man
disappears to the rest rooms and the network is so owned.
6
Apathy:
Q: Which is the most useful to a social engineer? Ignorance
or apathy?
A: I don’t know and I don’t care
The three employees of the shipping department all got the
same generic phishing email from UPS popping into their
inbox more or less at the same time. None of them took the
time to hover their mouse over the link and see that the link
really went to a Slovak site with '.cz' at the end.
Furthermore, not one of them 'prairie-dogged' up from their
cubicle to warn the others. Two of the three clicked on the
link and got their workstation infected with nasty malware
that required a wipe-and-rebuild of their machines.
7
As you can see the genie is out of the bottle. Cybercrime has taken the concept
of social engineering and it's out in the wild. So, what to do?
1.Publish and distribute comprehensive security policy.
2.Understand that policy is the start of dealing with the problem.
3.Acknowledge that there is no effective implementation of policy which doesn’t
include a degree of education.
4.Be realistic. Education doesn’t mean making end-users security experts. It
means teaching them all they need to know to use computers safely.
5.Have a look at Kevin Mitnick Security Awareness Training.
Hat Tip to David Harley, Kevin Mitnick, Chris Hadnagy, SANS, and many others. For more info and useful links about
Social Engineering check out the WikiPedia page, and a great article by David Harley over at the cluestick site.
www.KnowBe4.com

Más contenido relacionado

Similar a The Seven Social Engineering Vices

Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Blue team responses to people who "hack like a girl"
Blue team responses to people who "hack like a girl" Blue team responses to people who "hack like a girl"
Blue team responses to people who "hack like a girl" Kate Brew
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyAlisa Alvich
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queogglili
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionEMC
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Kindergarten Letter Writing Paper Awesome Writing Tabl
Kindergarten Letter Writing Paper Awesome Writing TablKindergarten Letter Writing Paper Awesome Writing Tabl
Kindergarten Letter Writing Paper Awesome Writing TablArlene Smith
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devilUltraUploader
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 

Similar a The Seven Social Engineering Vices (20)

Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Blue team responses to people who "hack like a girl"
Blue team responses to people who "hack like a girl" Blue team responses to people who "hack like a girl"
Blue team responses to people who "hack like a girl"
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social Engineering CSO Survival Guide
Social Engineering CSO Survival GuideSocial Engineering CSO Survival Guide
Social Engineering CSO Survival Guide
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Case Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the queCase Project 2 Read the following Case Study and answer the que
Case Project 2 Read the following Case Study and answer the que
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Kindergarten Letter Writing Paper Awesome Writing Tabl
Kindergarten Letter Writing Paper Awesome Writing TablKindergarten Letter Writing Paper Awesome Writing Tabl
Kindergarten Letter Writing Paper Awesome Writing Tabl
 
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...
 
A pact with the devil
A pact with the devilA pact with the devil
A pact with the devil
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
McGregor Watkins
McGregor WatkinsMcGregor Watkins
McGregor Watkins
 

Último

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

The Seven Social Engineering Vices

  • 1.
  • 2. You may not be aware that there is a scale of seven deadly vices connected to social engineering. The deadliest social engineering attacks are the ones that have the highest success rates, often approaching 100%. What is the secret of these attacks, how come they succeed so well?
  • 3. Your own observations show you that people are very different. Some are always enthusiastic and willing to learn something new. Others are more conservative but courteous to their co-workers. A bit further down this scale are people that always looks like they are bored with life and then at the bottom are those who just don't care and basically are in apathy about everything.
  • 4. Successful social engineers first determine where their target is on this scale, and then select an attack that will have the highest degree of success with that person, trying to closely match their target's look on life.
  • 5. This scale of vices can be approached from either a negative or positive side. You can either call it gullibility or you can call it trust, call it greed or self-interest, but since we're talking vices here we'll stick to the negative labels. Here are seven social engineering attacks that I hope are a good example of each one of the deadly vices, but note there is always overlap and things are not that clear-cut. We are dealing with humans after all!
  • 6. Curiosity: The attacker left a USB stick next to the washing basin in the restroom of the floor that had the executive offices and their administrative assistants. It was clearly marked 'Q1 Salary Updates'. The USB drive had modified malware on it that installed itself and called home from any workstation it was plugged into. This attack was 90% effective. 1
  • 7. Courtesy: The attacker focused in on the CEO of his target company. He did his research, found the CEO had a relative battling cancer and was active in an anti-cancer charity. The attacker spoofed someone from the charity, asked the CEO for his feedback on a fund-raising campaign and attached an infected PDF. Mission achieved, the CEO's PC was owned and the network followed shortly after. And of course holding the door open for a stranger with his hands full of boxes is a classic 'Courtesy' piggybacking example that we all know. 2
  • 8. Gullibility: Attackers identified the proper managers at two separate branches of their targeted bank. They bought a domain name that looked very similar to the bank's domain. They spoofed the bank exec's emails and sent bogus emails to the manager authorizing transaction. They walked in with a counterfeit check and a fake driver's license, and walked out with 25,000 in cash...repeatedly! 3
  • 9. Greed: Did you know that the Nigerian 419 scams these days use the word 'Nigeria' on purpose to qualify their targets up front? It's now utilized as a filter to weed out people and grab the uneducated ones that are greedy enough to take a risk and answer the 26 year old orphan girl that has $12,500,000 in the bank, needs a guardian and some help transferring the funds... 4
  • 10. Thoughtlessness: The combined U.S. and Israeli intelligence arms created the Stuxnet malware which sabotaged Iran's Natanz uranium enrichment centrifuges. It was carried in via a simple USB attack on one of their scientists. The Mossad slipped a USB drive to the scientist who plugged the stick in his laptop at his house, went to work and there connected the laptop to the internal Natanz network. Social Engineering jumped the air-gap due to a scientist who should have known better. 5
  • 11. Shyness: A Brad Pitt look-alike walks up to the internal reception of the Human Resources Department of a French multinational's Boston office. He profusely apologizes for being a few minutes late and shows a piece of paper with coffee stains. He explains he spilled coffee over his resume and if the receptionist "pretty please with sugar" can print a fresh copy for his interview? He hands over the USB drive, the shy receptionist does not confront him with the company policy that no foreign devices are allowed on the network, quickly prints a new copy and hands him the stick back. The young man disappears to the rest rooms and the network is so owned. 6
  • 12. Apathy: Q: Which is the most useful to a social engineer? Ignorance or apathy? A: I don’t know and I don’t care The three employees of the shipping department all got the same generic phishing email from UPS popping into their inbox more or less at the same time. None of them took the time to hover their mouse over the link and see that the link really went to a Slovak site with '.cz' at the end. Furthermore, not one of them 'prairie-dogged' up from their cubicle to warn the others. Two of the three clicked on the link and got their workstation infected with nasty malware that required a wipe-and-rebuild of their machines. 7
  • 13. As you can see the genie is out of the bottle. Cybercrime has taken the concept of social engineering and it's out in the wild. So, what to do? 1.Publish and distribute comprehensive security policy. 2.Understand that policy is the start of dealing with the problem. 3.Acknowledge that there is no effective implementation of policy which doesn’t include a degree of education. 4.Be realistic. Education doesn’t mean making end-users security experts. It means teaching them all they need to know to use computers safely. 5.Have a look at Kevin Mitnick Security Awareness Training. Hat Tip to David Harley, Kevin Mitnick, Chris Hadnagy, SANS, and many others. For more info and useful links about Social Engineering check out the WikiPedia page, and a great article by David Harley over at the cluestick site.