SlideShare una empresa de Scribd logo
1 de 45
Descargar para leer sin conexión
NEVER SURRENDER
Reducing social engineering risk
Rob ragAn
@sweepthatleg
Christina Camilleri
@0xkitty
Shower Foo
What if I say I’m not like the others
What if I say I’m not just another one
of your plays
You’re the pretender
What if I say I will
never surrender
Who The…
Let’s get our hands dirty
What is social engineering?
An exploitation of TRUST
Someone who can leverage the trust of their
victim to gain access to sensitive information or
resources or to elicit information about those
resources
We are professional liars.
People are Vulnerable
And WE are lazy
and we want to be helpful
and we WANT to be noticed.
And social engineering is
the path of least resistance.
the biggest issue we face in infosec.
We are the root of all evil, and the
reason for all security issues.
There is no patch for human stupidity.
People – psychology
Computers – Technology
When it comes to security, We are unreliable.
Technical systems are:
reviewed
scanned
penetration tested
But…
How do we measure
vulnerability in people?
We don’t.
We SHAME and Blame.
We make them feel bad for their behavior.
We are Ignorant.
*And we’re not doing anything to effectively change this.
We avoid testing because it makes us
feel vulnerable.
And we don’t like to feel vulnerable.
psychology + Technology =
We fall victim to basic psychological and
physical needs:
Cialdini 6
Authority
Liking
Social Proof
Scarcity
Reciprocity
Commitment and Consistency
Let me Tell you a story.
Let me Show you how.
Information gathering
Developing a relationship
exploitation
execution
What are we doing wrong?
Almost everything.
We watch videos
We do e-learning modules
We tick boxes
We make posters
And generally feel good about ourselves.
No. You’re doing it wrong too.
Tracking.
Frequency.
Conditioning.
Tracking.
Stop tracking clicks
Stop tracking by department
Don’t track failed attempts
track successes
Track successful reported incidents.
The graph should ideally go up
not down. 
Awareness training should feed a
strong SE specific IR plan
Frequency.
Stop shoving awareness training down
people’s throats.
Conditioning.
Stop using negative reinforcement.
Use positive reinforcement.
Let me Tell you another story.
How do we plan to fix this?
A multi-phased cyclical approach: 
SE > PT > IR > PPP > ES >
SE > PT > ...
Rinse, repeat
How do we plan to fix this?
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
5.  Browser plugins
6.  Org wide web proxy
7.  Alert on org relevant [phishing] domains
8.  Customization of authN to mitigate cloning
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
5.  Browser plugins
6.  Org wide web proxy
7.  Alert on org relevant [phishing] domains
8.  Customization of authN to mitigate cloning
9.  Application whitelisting
10.  Encrypt sensitive data (in transit & at rest)
11.  Enforce a VPN when not on internal network
12.  Perform regular simulated SE for a more prepared IR team
Questions?
Special Thanks
@lady_nerd @CandySaur @lunarca_ @tastic007 @Napordie
Rob ragAn
@sweepthatleg
Christina Camilleri
@0xkitty
BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Application security
Application securityApplication security
Application security
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Brute force attack
Brute force attackBrute force attack
Brute force attack
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social Engineering and What to do About it
Social Engineering and What to do About itSocial Engineering and What to do About it
Social Engineering and What to do About it
 

Destacado

Tenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of BingTenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Rob Ragan
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Rob Ragan
 

Destacado (20)

Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of BingTenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of Bing
 
Beyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importanceBeyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importance
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
 
Customer Acquisition Through Social Media
Customer Acquisition Through Social MediaCustomer Acquisition Through Social Media
Customer Acquisition Through Social Media
 
Babelfish Articles Nov 2011
Babelfish Articles Nov 2011Babelfish Articles Nov 2011
Babelfish Articles Nov 2011
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law Firms
 
Joakim Dahl IT Verksamhet
Joakim Dahl IT VerksamhetJoakim Dahl IT Verksamhet
Joakim Dahl IT Verksamhet
 
Tutorial net beans
Tutorial net beansTutorial net beans
Tutorial net beans
 
FESC.PPT
FESC.PPTFESC.PPT
FESC.PPT
 
Presentación taller de equipo de medición
Presentación taller de equipo de mediciónPresentación taller de equipo de medición
Presentación taller de equipo de medición
 
Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.
 
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
Fuente de voltaje  12 v,12v-04_ing_ite_pit_eFuente de voltaje  12 v,12v-04_ing_ite_pit_e
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
 

Similar a BSidesPGH - Never Surrender - Reducing Social Engineering Risk

DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
Emerson Exchange
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
Paul W. Taylor
 

Similar a BSidesPGH - Never Surrender - Reducing Social Engineering Risk (20)

Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
R af d
R af dR af d
R af d
 

Más de Rob Ragan

Expose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach Patterns
Rob Ragan
 
Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010
Rob Ragan
 

Más de Rob Ragan (8)

Nbt hacker fight
Nbt hacker fightNbt hacker fight
Nbt hacker fight
 
Expose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach Patterns
 
DeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than DeadDeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than Dead
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet FarmerCloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
 
Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010
 
Filter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireFilter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the Wire
 
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without Fighting
 

Último

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Último (20)

Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 

BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Notas del editor

  1. Who has performed social engineering assessments? Who has been a victim of social engineering? Are you sure? Who has a concern that their organization may be or may have already been a victim of a successful social engineering attack?
  2. The inspiration for this talk came from a few experiences during social engineering engagements. Also from listening to the Foo Fighters in the shower. Also from the pleasure and opportunity to work with one of the best social engineering talents in the industry. Why don’t most organization want to perform regular SE assessments? Have they given up? NEVER SURRENDER TO THE PRETENDERS
  3. Christina – Aussie. First time in Pittsburgh. Already saw her first large pine cone, first white tailed deer, first lightening bug. DEFCON SE CTF CHAMP! Going for as many rings as the Pittsburgh Steelers  Rob – Pittsburgher. Born and raised here. Lives in ATL now. Started his hobby and now profession in security right here at PA2600 in the Pitt Student Union ~12 years ago. Lots of familiar faces here. Come ask me about my IRC handle and fun times at Summercon 2004.
  4. DO IT!
  5. As always, I’ll start with a definition of Social Engineering. Taken from social-engineer.org, it’s defined as “The act of manipulating people into performing actions or divulging confidential information..” It’s a blend of science, psychology and art and it taps into basic human emotions and looks at why we react the way we do. Social engineers study people. Truly committed social engineers will study a lot about body language, voice control, vocal indicators and group dynamics. It’s also a study of individual personality types that come out through body language and vocal cues.
  6. A more simple definition of Social Engineering would be “an exploitation of TRUST” – someone who can leverage the trust of their victim to gain access to sensitive information or resources or to elicit information about those resources. The use of social engineering is successful because it preys not on technology, but on the inherent weaknesses of the human component. This is done by manipulating the human victim with messages that exploit your trust, pique your interests and desires, and evoke a range of strong human emotions such as fear, anxiety, trust, human interest and reward.
  7. To make this simple – we are professional liars.
  8. And people are vulnerable, lazy, and we want to be helpful and be noticed., making people an especially enticing target. As a really simple example.. we can spend hours, weeks or months trying to brute force our way to a password… when a phone call with the right pretext and right questions can get you the same password or more in a few minutes.
  9. And that’s exactly it. SE is the path of least resistance. So.. utilising techniques such as planning the right pretext (which is creating and using a contrived scenario), exploiting trust, and appealing to someone’s emotions often results in obtaining the same piece of information - it is almost unbelievable what you can achieve by simply asking, looking or posing as someone. And as software vendors get more and more secure and their products get harder to crack, the role of social engineering becomes greater. And so, we need to understand what it is a social engineer will try, how they will try it and what methodology they may use.
  10. But let me tell you why I care. Social engineering is undoubtedly one of the weakest links in the domain of information security, simply because it is beyond technological control and subject to human nature. We can’t necessarily control the way each individual thinks and reacts, which makes it much more challenging aspect of security to handle.
  11. To keep it simple, people are the root of all evil, and we are the reason for all security issues.
  12. And this is because there is NO patch for human stupidity.
  13. When you combine people with technology, you will encounter problems. People are unreliable.
  14. Technical systems are reviewed, scanned and pentested.
  15. But…. How about people? How do we measure vulnerabilities in people?
  16. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  17. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  18. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  19. And when you combine people with technology, you get this big blob of mess.
  20. People are unreliable. People fall victim to basic psychological and emotional needs, and people can be manipulated and persuaded.
  21. To break this down, there’s 6 useful frames called the Cialdini 6 when it comes to SE and effectual persuasion, and those are: Authority- we tend to be influenced by authority positions Liking – We’re influenced by those we like Social Proof – We look at others to determine good behaviour Scarcity – Value is tied to availability Reciprocation – We feel like we have an obligation to return what others provide (favours) Commitment and Consistency – We are pressured to remain consistent with prior engagements
  22. With one engagement at my old job, I had posed as an internal employee for a law enforcement agency and after doing some recon and finding out that the target I had chosen was on holidays – I crafted a pretext on the information that I knew… and that was that I had to come back early from my holiday in Hawaii (which I found posted on her Facebook) to urgently finish a report for my manager. And when you create that sense of urgency, they were naturally inclined to help.. And from there I had managed to get ahold of the IT department using the same sense of urgency and praising them for being so helpful. I said – “I really need to finish this report but oh no.. I’ve forgotten my both my domain and email password because I’ve been on holidays – I’m so sorry! – Can you please help me out?” And what was most surprising is that I got exactly what I wanted which were both passwords read to me over the phone with absolutely NO cross checking that I was who I actually said I was – other than me also being the same gender as my target.. And what was amusing is the guy, let’s call him Mike said “I’m not supposed to do this, but….” and gave me both passwords. He had also asked me what I wanted to set it to, and I said “something simple..” and he said “Ok, sure, I’ll set it to ‘Password1’ but put a dollar sign in front just to be a bit more secure” Thank you Mike! But the point of this is.. this works because most people trust others by default and respond well to social rewards. Many people, especially customer service agents, help desk receptionists, and business assistants or secretaries who are trained to assist people and not to question the validity of each request, tend to trust others and are naturally helpful. + Naomi Wolf story/Robin Safe. There’s this inherit trust we put into social media and it’s absolutely terrifying what you can pull out of this.
  23. And so to demonstrate this in a simple attack model, we really just need to gather the right information, develop a relationship with whoever your target is (be it through small talk or a common interest), exploiting that trust and executing your attack.
  24. Enough about the fluffy stuff. What are we doing wrong? Why is this still such a big issue?
  25. Since everyone loves statistics, a rough estimate of almost 50% of enterprises have been victim to SE attacks, even when most IT and security professionals are aware of this risk.. but aren’t doing enough to prevent or defend this risk. And regardless, SE still has a high success rate through simple means like phishing phone calls. But it is also important to point out that due to human factors, “knowing better but not doing better” is one of the key issues that has not been fully addressed, particularly in the IS domain.
  26. The answer to that question is everything. We are doing a lot wrong.
  27. We like to….. But is this really helping?
  28. Stop using negative reinforcement. Rubbing their nose in it like a dog is demeaning and degrading. ​ Use positive reinforcement. If a person at the organization reported an incident, track that, reward them, and make them a good example for others to follow. ​ How do you get folks on the defensive? ​ Make it easy.​ Make it default.​ Make it rewarding. 
  29. An organization comes to us and wants to develop SE defense for their customer support representatives (CSRs). They have 4000 CSRs and some are in the US, some are offshore, some are in-house, some are external third-parties. Currently training and simulated SE scenarios are performed ad hoc. They have had some incidents recently. Attackers are calling in and coercing CSRs into giving them access to PII and/or access to customer accounts. (Risk #1) On top of that, the CSRs are regularly receiving emails that are actually phishing scams. An email that prompts them to reset their email password is a regular occurrence. (Risk #2) Occasionally the CSRs get malware infections on their terminal, the source is not always clear but it causes downtime when we have to re-image their machine (Risk #3)
  30. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223
  31. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223
  32. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223