Social Engineering: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
No edit summary
Line 8: Line 8:
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.
There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data.  All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly.  In all methods, feedback from the victim is required.  This feedback is usually the necessary information the attacker was looking for.


Although social engineering tactics are heavily performed through electronic and computer mediums.  There are many methods in which social engineering can be done through the physical realm.  As long as there can be some form of communication between the attacker and the victim any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.
Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm.  As long as there can be some form of communication between the attacker and the victim, any medium may be used.  Social engineering is so successful because it takes advantage of the fallacies of the human being.  Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.


Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renouned hacker and early user of social enginering, was considered the most dangerous hacker.  By using social engineering, the FBI though that Mitnick could start a nuclear war by simply utilizing social engineering.   
Social Engineering can be extremely simple to perform, but have dire effects and consequences.  There are even [http://news.cnet.com/8301-1009_3-9995253-83.html guides and tips] on how hackers have used social engineering in extremely simple ways.  Social engineering is considered so dangerous that [http://en.wikipedia.org/wiki/Kevin_Mitnick Kevin Mitnick], a renowned hacker and early user of social enginering, was considered the most dangerous hacker.  The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.   


===Phishing===
===Phishing===
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security Numbers.
The main way of retrieving electronic information from victim voluntarily is through [http://en.wikipedia.org/wiki/Phishing phishing].  Phishing, like social engineering, can be performed over various electronic and physical mediums.  In a general term, phishing is pretending to be something legitimate, when you are not.  When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source.  This may include account numbers, usernames, passwords, or even Social Security numbers.


A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was setup by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.
A major medium of phishing is through e-mail.  The example of a bank and customer is extremely common.  The attacker will send the victim an e-mail notifying them of some required account information to be updated.  This e-mail will look exactly like the standard e-mail the victim may have received from the bank before.  The victim will be required to login and update their information as soon as possible.  However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information.  This website, like the e-mail, will look exactly like the actual bank website.  Once the person types their login information, the attacker then has all the information they needed from the victim.


Although uncommon, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that they are legitimate.  Usually, a victim will not question the call and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.
In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information.  The attacker may even know some basic information about the victim to prove that (s)he is legitimate.  Usually, a victim will not question the caller's authority and will provide the necessary information.  The attacker can then use this information to take advantage of the victim by means of identity or property theft.


===Pretexting===
===Pretexting===
Line 25: Line 25:


===Trojan Horse===
===Trojan Horse===
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of coruse, derived from the ancient tactic used by the Spartans to invade Troy by pretending to be a gift to the Trojans (which is an ancient example of social engineering).
A [http://www.tech-faq.com/trojan-horse-virus.shtml Trojan Horse] a technological form of social engineering.  Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using.  A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background.  This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).


To be specific, a ''gimme'' is a type of Trojan Horse that plays off of Social Engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.
To be specific, a ''gimme'' is a type of Trojan Horse that plays off of social engineering.  This tactic goes in conjunction with spamming or phishing.  The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them.  Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine.  The software may even perform as advertised, but in the background is obtaining account information and other confidential data.


This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is an automated computer program.
This is where a computer program pretends to be something it is not.  Instead of an actual human being performing the pretexting, it is done by an automated computer program.


==Security, Precautions, and Defenses==
==Security, Precautions, and Defenses==

Revision as of 17:14, 2 August 2008

Social engineering a method of fraud and hacking that utilizes the humanity and nature of people to retrieve information from them voluntarily. By playing into the nature of the person, hacking through technological means is sometimes not necessary. If one can fool a person into giving away information voluntarily, then creating a program or hack to retrieve that information involuntarily is not required. Furthermore, it can be much simpler and efficient to get information from someone through social engineering than it would ever be to steal that information via a computer program or password cracker.

This form of forcing users to disclose information must be done through some human means. The point of social engineering is to utilize the fallacies of human logic and biases to trick the target into revealing confidential information through various methods and tactics.

Social engineering requires guardians of information to be very proactive. For example, you can use an antivirus program that will passively scan your computer for viruses automatically. However, the human must be actively on the defense for social-engineering tricks and tactics that may be used against them. Over the years, general guidelines for companies and employees have been developed to give the knowledge necessary to be vigilant and alert for social engineering fraud attempts.

Tactics and Methods

There are various means of utilizing social engineering to obtain confidential and secret information such as passwords and private data. All of these methods work through some medium in which the attacker has to actually converse with the victim in some way, whether directly or indirectly. In all methods, feedback from the victim is required. This feedback is usually the necessary information the attacker was looking for.

Although social engineering tactics are heavily performed through electronic and computer media, there are many ways to do social engineering through the physical realm. As long as there can be some form of communication between the attacker and the victim, any medium may be used. Social engineering is so successful because it takes advantage of the fallacies of the human being. Whether by means of flattery, impersonation, and greed; social engineering is considered to some an art form of psychology.

Social Engineering can be extremely simple to perform, but have dire effects and consequences. There are even guides and tips on how hackers have used social engineering in extremely simple ways. Social engineering is considered so dangerous that Kevin Mitnick, a renowned hacker and early user of social enginering, was considered the most dangerous hacker. The FBI thought that Mitnick could start a nuclear war by simply utilizing social engineering.

Phishing

The main way of retrieving electronic information from victim voluntarily is through phishing. Phishing, like social engineering, can be performed over various electronic and physical mediums. In a general term, phishing is pretending to be something legitimate, when you are not. When you fool the victim into thinking you are the legitimate source that is being faked, they will reveal all the information that would normally be required to use that source. This may include account numbers, usernames, passwords, or even Social Security numbers.

A major medium of phishing is through e-mail. The example of a bank and customer is extremely common. The attacker will send the victim an e-mail notifying them of some required account information to be updated. This e-mail will look exactly like the standard e-mail the victim may have received from the bank before. The victim will be required to login and update their information as soon as possible. However, the link will not be sent to the bank website, but to a separate server that was set up by the attacker to retrieve the information. This website, like the e-mail, will look exactly like the actual bank website. Once the person types their login information, the attacker then has all the information they needed from the victim.

In unusual cases, phishing may also be performed over the phone by pretending to be a representative of some company that is requesting some kind of account information. The attacker may even know some basic information about the victim to prove that (s)he is legitimate. Usually, a victim will not question the caller's authority and will provide the necessary information. The attacker can then use this information to take advantage of the victim by means of identity or property theft.

Pretexting

Pretexting is a form of using information about the victim to obtain even more information or to use it against the victim. Through pretexting the attacker uses the limited information gained to obtain more information. Once enough information is gained. The attacker may use credit pretending to be the victim, to make purchases acting as the victim, or to manipulate the records of the victim.

The goal of pretexting is to prove to someone that you are legitimately the victim. This may be done from proving that you know their name, address, phone number, and Social Security Number. This could also be done by knowing the victim's username and password that was retrieved through phishing.

Trojan Horse

A Trojan Horse a technological form of social engineering. Not only does it fool the victim that it is from a legitimate source, but it also fools the computer the victim is using. A Trojan horse is a program that may seem to perform a legitimate action, but in fact is collecting sensitive information or stealing data in the background. This is, of course, derived from the tactic used by the Spartans to invade Troy by presenting the Trojans with a gift horse containing Spartan soldiers (this is an ancient example of social engineering).

To be specific, a gimme is a type of Trojan Horse that plays off of social engineering. This tactic goes in conjunction with spamming or phishing. The user will receive a pop-up ad or e-mail ad notifying the victim of some software that would benefit them. Because of their curiosity and the seeming innocence of the program, the victim will install it on their machine. The software may even perform as advertised, but in the background is obtaining account information and other confidential data.

This is where a computer program pretends to be something it is not. Instead of an actual human being performing the pretexting, it is done by an automated computer program.

Security, Precautions, and Defenses

There are many precautions and defenses against social engineering. However, there is a lack of education on the methods to defend against this tactic. Various methods include vigorous identity verification, minimizing the amount of people that have sensitive information, as well as reducing the trust level of those in control of information. Many companies have developed security policies and guidelines that employees should follow to minimize the risk of social engineering exploits.

Proactive Social Defenses

SANS Network Security has a good example of a brief guide for employees to maintain a proactive awareness against social engineering. Through proactive self defense a company should develop a detailed policy on security and data release. These policy should detailed who is able to release information, what information, and to who that information may be released to.

There should be detailed access approval to any secured area or information. A company should setup a defense against social engineering by always having a detailed access approval process instead of simply not challenging the requester of information. The company should have a designated help desk and support center that is knowledgeable in the policies of data release. Information such as employee IDs, account information, and passwords should always be challenged with a detailed approval policy.

By detailing who is allowed to release information and what information can be released, a company can minimize the amount of violations through social-engineering. Usually social engineering succeeds because there is no preset guideline for giving out information for rare instances that social engineers exploit.

Employee Training

Since the human being is the reason for social engineering exploits, the employee is the number one defense against attacks. By training the employees through examples, they gain an understanding of how easy it is for social engineering to work. By training to employees to reduce their trust value and not take request for information at face value, it will discourage the attacker to request any further information. If in doubt, the employee should never give out confidential information and bring it to the next person in command.

Security Software and Electronics

Since the goal of social engineering exploits are to bypass technological and security barriers, there are few ways to stop social engineering through electronic and software means. One main way to combat and reduce the risk is to have, in place, strict identity verification technologies that combat counterfeit and impersonation attacks. Social engineering attacks are so easy because it is so easy to appear legitimate. If identify verification were scrutinized at both a human and electronic level, the legitimacy of identity would be much harder to prove.

In addition, companies can install software that will reduce the amount of social engineering solicitations that employees receive through e-mail and websites. By filtering out known threatening sources, this software can prevent the employee from even having to worry about making the decision of whether the source is legitimate.

Legal and Ethical Concerns

In the United States, there are laws against pretexting and falsifying identity. The Gramm-Leach-Billey Act (GLBA) makes it illegal to do the following

  • To falsify information or make false statements to retrieve information from a financial institution or even a customer of that institution
  • To use forged or stolen documents to receive information from a financial institution or a customer of that institution
  • Ask another person to obtain information by using the above two means

In addition, the Federal Trade Commission Act prohibits pretexting for customer information.

>> NEED ETHICAL CONCERNS <<

Study Guide

This study guide relates to security precautions against Social Engineering. For the main Security Precautions study guide, go here.

1. Why Are Security Precautions Necessary to Safeguard Against Social Engineering?

  • In the United States, identity, both personal and financial, are held digitally. Typical social engineering attacks aim at stealing the digital identities of people. This can ruin their credit and ability to purchase things, as well as reputations when it comes to employment. Here are some tips from the FTC on safeguarding your information. You should never give out information unless you are certain of the source. You should also limit the amount of information you allow organizations to have. They are also prone to hacking and social engineering threats that could steal your identity.
  • If security precautions are note made against social engineering, a skilled hacker could forge his way into nearly any system. It is said that the famous social engineering, Kevin Mitnick, would be able to set off nuclear missiles from his phone using social engineering tactics. It is important that organizations and individuals be aware of the threat of social engineering. Do not take everything at face value.
  • Social engineering attacks are not just made through electronics means. Social engineering tricks play on the fallacy of a human and their associated emotions. It is important for an individual to be aware of the threats and tactics of social engineering. Social engineers typically target gullible members of a company to obtain small bits of information and work their way up, gaining more information. If you are alert to these threads, you are better defender against both your identity, your employer, as well as your clients.
  • The act of social engineering is very vague. It is sometime very hard to tell when you are being tricked by a fraudulent act. It is necessary that employees in control of sensitive information should go through rigorous training to sense when they are being tricked.

2. Social Engineering Security Precautions Are Not Easy

  • Since social engineering does not necessarily require any special technical skill set, like hacking, it is open to many types of attackers that are adept at fooling an individual.
  • It is hard to devise structured policies to defend against the leak of confidential information through the means of social engineering. There is no single solution for solving the problem of social engineering. It is up to the company to do the best job they can creating useful policies for the release of sensitive data. Employees much also be aware of the various methods and tactics used by social engineers to obtain information.
  • Unlike hacking or stealing by force, social engineering is very elusive. Almost always, when information is released, the victim has no idea they gave it to someone posing as a legitimate source.

3. Ethical Responsibilities

4. Some Security Products That Could Help You

Useful Resources

Definitions and Descriptions of Social Engineering:

Defense and Tips against Social Engineering Attacks: