Handbook of Social Engineering

Teacher

Professional
Messages
2,670
Reaction score
783
Points
113
Further from the author's words:

A small introduction.
Information is one of the most important assets of the company. Information may constitute a commercial secret of the company, i.e., under existing or possible circumstances, increase revenues, avoid unnecessary expenses, maintain its position in the market of goods, works, services, or bring other commercial benefits to the company. Accordingly, such information must be protected.

Since any company employs people, it is inevitable that the human factor affects all the processes of the organization. Including the process of protecting confidential information.
The human factor is a stable expression that denotes a person's mental abilities as a potential and actual source (cause) of information problems when using modern technologies by this person.
Any actions of a person associated with a violation of the security regime can be divided into two broad categories: intentional and unintentional actions.

Deliberate actions include theft of information by employees, modification of information, or its destruction (sabotage). This is an extreme case and you have to deal with it after the fact, involving internal affairs officers.

Unintentional actions include: loss of information carriers, destruction or distortion of information due to negligence. The person does not realize that his actions lead to a violation of the trade secret regime.

Unintentional actions also include "helping" the wrong people, or so-called social engineering. When an employee does not realize that his actions are aimed at violating the trade secret regime, but at the same time, the person who asks him to do this clearly knows that he is violating the regime.

Social engineeringthis is a method (attack) of unauthorized access to information or information storage systems without the use of technical means. The method is based on the use of weaknesses of the human factor and is very effective. An attacker obtains information, for example, by collecting information about employees of the target of the attack, using a regular phone call, or by entering the organization under the guise of its employee.

Basic model of social engineering
It is assumed that each employee has their own level of competence in security issues and their own level of access. Line employees (for example, receptionists) do not have access to critical information, so even capturing their accounts and getting all the data they know will not cause serious damage to the company. But their data can be used to move to the next stage already inside the protected zone. For example, you can get the names of employees and call a higher level by introducing yourself as one of them.

Don't believe me? Imagine a situation where an attacker calls the same girl from a call center several times a week for a month. He introduces himself as an employee, brings a lot of positive emotions, talks vividly, clarifies some open trifles, and sometimes asks for minor help. Clear authorization is replaced by the fact that the person calls frequently. Ten, twenty, thirty times if necessary. Until it becomes one of the phenomena of life. He is his own, because he is aware of various details of the company's work and calls constantly.

If you think that only incompetent users are susceptible to such attacks, then open the book" The Art of Deception", where Mitnick talks in the introduction about how he introduced himself as the lead developer of the project and forced, for a second, the system administrator to give privileged access to the system. Notice a man who knew exactly what he was doing.

Let's analyze the main methods of social engineering:

Nonexistent links
An attack that consists of sending an email with a tempting reason to visit the site and a direct link to it, which only has similarities with the expected site, for example, www.PayPai.com. It looks like it's a link to PayPal, but few people will notice that the letter "l" has been replaced with "i". Thus, when the victim clicks on the link, they will see a site that is as identical as possible to the expected one, and when entering their credit card details, this information is immediately sent to the attacker.

One of the most well-known examples of global phishing mailing is the 2003 scam, in which thousands of eBay users received emails claiming that their account had been blocked and that they needed to update their credit card information to unlock it. All of these emails contained a link leading to a fake web page that looked exactly like the official one. However, according to experts, the losses from this scam amounted to less than a million dollars.

Fraud involving the use of brands of well-known corporations
These phishing schemes use fake email messages or websites containing the names of large or well-known companies. Messages may include congratulations on winning a contest held by the company, or that you urgently need to change your credentials or password. Similar fraudulent schemes can also be carried out on behalf of the technical support service by phone

False emails with offers of freebies or something interesting.

The victim may receive an offer that touches the main strings of the soul of most people - this is greed and curiosity, for example:

Fake antivirus programs, also known as "scareware", are programs that look like antivirus programs, but in fact, the opposite is true. Such programs generate false notifications about various threats, and also try to lure the user into fraudulent transactions. The user may encounter them in email, online ads, social networks, search engine results, and even in pop-up windows on the computer that mimic system messages.

The user can receive messages stating that they have won a lottery held by a well-known company. Externally, these messages may look as if they were sent on behalf of one of the high-ranking employees of the corporation.

In the movie Whoami, this method is used when hackers send the victim an infected email from a supposedly familiar victim with a postcard and the caption look what kittens.

IVR or phone phishing
Phone phishing-vishing (English vishing - voice fishing) is so named by analogy with phishing.This is one of the methods of fraud using social engineering, which consists in the fact that attackers, using telephone communication and playing a certain role (bank employee, buyer, etc.), under various pretexts lure confidential information from the payment card holder or encourage them to perform certain actions with their card account / payment card.

As for IVR systems, this technique is based on the use of a system of pre-recorded voice messages, in order to recreate the "official calls" of banking and other IVR systems. Usually, the victim receives a request (most often via phishing email) to contact the bank and confirm or update any information. The system requires user authentication by entering a PIN or password. Therefore, by writing down the keyword beforehand, you can find out all the necessary information. For example, anyone can write a typical command: "Press one to change your password.

Phone phreaking
Phreaking is a term that describes experimentation and hacking of telephone systems using audio manipulation of the tone dial. This technique appeared in the late 50s in America. The Bell Telephone Corporation, which then covered almost the entire territory of the United States, used tone dialing to transmit various service signals. Enthusiasts who tried to repeat some of these signals were given the opportunity to make free calls, organize telephone conferences, and administer the telephone network.

Pretexting
Pretexting is an attack in which an attacker introduces himself as another person and uses a pre-prepared scenario to extract confidential information. This attack requires proper preparation, such as the date of birth, INN, passport number, or the last digits of the account, in order not to arouse suspicion in the victim. Usually implemented via phone or email.

In the TV series Mr. robot, this method is used in one of the episodes, when a hacker calls a victim posing as a bank employee and extracts personal information from him, such as the pet's nickname, date of birth, etc.which he later uses to bruteforce the password to the victim's account.

Quid pro Quo
Quid pro quo (from Lat. Quid pro quo — "something for this") — in English, this expression is usually used in the sense of "quid pro quo". This type of attack involves an attacker contacting the company via a corporate phone (using acting skills) or email. Often, the attacker introduces himself as a technical support employee who reports technical problems at the employee's workplace and offers help in fixing them.

Road apple
This attack method is an adaptation of the Trojan horse, and consists of using physical media. The attacker plants" infected " storage media in public places where these media can be easily found, such as toilets, parking lots, canteens, or at the workplace of the attacked employee. Media are issued as official for the company that is being attacked, or accompanied by a signature designed to arouse curiosity.

In the TV series Mr. robot, this method is used in one of the episodes, when hackers scattered flash drives with malware at the police station and one of the policemen picked it up and inserted it into the computer to see what was there.

Collecting information from open sources
The application of social engineering techniques requires not only knowledge of psychology, but also the ability to collect the necessary information about a person. A relatively new way to obtain such information is to collect it from open sources, mainly from social networks. For example, such sites as livejournal, Odnoklassniki, and VKontakte contain a huge amount of data that people don't even try to hide. As a rule, users do not pay due attention to security issues, leaving data and information that can be used by an attacker freely available.

An illustrative example is the story of the abduction of Eugene Kaspersky's son. During the investigation, it was established that the criminals found out the schedule of the day and the routes of the teenager from his records on the page in the social network.

Even if you restrict access to information on your social network page, you can't be sure that it will never fall into the hands of scammers. For example, a Brazilian computer security researcher showed that it is possible to become a friend of any Facebook user within 24 hours using social engineering techniques. During the experiment, researcher Nelson Novaes Neto chose a victim and created a fake account of a person from her entourage — her boss.

In the future, I will post an article in which I will describe the most effective ways to collect information about the victim from open sources.

Shoulder surfing
Shoulder surfing involves watching the victim's personal information over their shoulder. This type of attack is common in public places, such as cafes, shopping centers, airports, train stations, and public transport.

A survey of IT professionals about security showed that:
85 % of respondents admitted that they saw confidential information that they were not supposed to know;82% admitted that the information displayed on their screen could be seen by unauthorized persons;82 % are not sure that anyone in their organization will protect their screen from unauthorized persons.

Reverse Social Engineering
Reverse social engineering is mentioned when the victim offers the attacker the information they need. This may seem absurd, but in fact, individuals with authority in the technical or social sphere often receive user IDs and passwords and other important personal information simply because no one doubts their integrity. For example, support staff never ask users for their ID or password; they don't need this information to solve problems.

I'll give you some examples:
An attacker working with the victim changes the file name on the victim's computer or moves it to another directory. When the victim notices that the file is missing, the attacker claims to be able to fix it. If the victim wants to complete the work faster or avoid punishment for losing information, he agrees to this offer. The attacker claims that the problem can only be solved by logging in with the victim's credentials. Now the victim asks the attacker to log in under her name in order to try to recover the file.

Conclusion
We have analyzed the main methods of social engineering, and in the future we will talk about each of these methods in more detail, as well as try them out in practice and see what happens!
Some of the information for this article was taken from Wikipedia, some from habra. For your and my convenience, I formatted it at my discretion and supplemented it with my comments.
 
How to hack a corporate security system? Sometimes all you need to do is make a phone call or write an email. So says Kevin Mitnick, formerly the world's most famous hacker, and now an information security consultant, founder of Mitnick Security Consulting.

Kevin Mitnick is a former hacker who hacked the information systems of the world's largest companies, and now an information security consultant, founder of Mitnick Security Consulting. Author of the books "The Art of Deception" and "The Art of Invasion".

Social engineering – methods used by hackers to deceive corporate users and circumvent the most powerful information security systems. For more information about the pitfalls of trusting employees, see the article following Kevin Mitnick's speech at the Enterprise Information Security Conference held in Moscow in 2005.

Today, the human factor in information security plays a much more important role than 20 years ago, when the Internet was not commercial and its users were only specialists. Many companies that think that the problem of information security can be solved simply with the help of hardware and software are greatly mistaken. Security technologies that we are used to trust – firewalls, identification devices, encryption tools, network attack detection systems, and others-are ineffective in countering hackers using social engineering methods.

Indirect attack
Imagine the situation: a large Moscow office center. You enter the elevator and see on the floor a CD with the logo of a well-known company and a sticker: "Strictly confidential. Employee salaries for 2005". The most natural human reaction is to take this CD, take it to your office, and insert it into the CD-ROM of your work computer. Let's assume you did. On Yandex. Disk – a file with the familiar MS Excel icon. You try to open it, but instead of columns of numbers and surnames, you only see the operating system message: "error, the file is corrupted."

This is a typical example of social engineering-a breach of a company's information security by influencing a person. There are many ways to manipulate people, and curiosity is just one of the motivations that can be used.

Why do attackers resort to social engineering?
  • This is easier than hacking a technical security system.
  • Such attacks cannot be detected using technical information security tools.
  • It's inexpensive.
  • The risk is purely nominal.
  • Works for any operating system.
  • It is almost 100% effective.

Base for a socioengineer
The first stage of any attack is research. Using the official accounts of the victim company, its patent applications, press reports about it, advertising brochures of this company and, of course, the corporate website, the hacker tries to get as much information as possible about the organization and its employees. Even the contents of trash cans are used, if they can be obtained. The social engineer finds out who in the company has access to the materials of interest to him, who works in what division and where this division is located, what software is installed on corporate computers...

A hacker always tries to pass himself off as someone who has the right to access the data of interest to him and who really needs this data on duty. To do this, they must be fluent in terminology, speak professional jargon, and know the internal procedures of the victim company. Then comes the development of an attack plan: you will have to invent an excuse or deception scheme that will help build a trusting relationship with the right employee.

Resident error (an example from the movie "Day Watch"): the main character (Anton Gorodetsky), having successfully imitated the identity of a representative of the enemy camp, tries to penetrate this very camp. As he passes the guard, he casually says, " Hi, Vitek!" to him, pointing to the guard's name tag pinned to his jacket. Unmasking should be done immediately: the guard's jacket is someone else's.

Most common attack methods:
  • Finding out, transmitting, or changing passwords without authorization
  • Creating accounts (with user or administrator rights)
  • Launching malicious software (such as a Trojan)
  • Finding out phone numbers or other methods of remote access to the corporate information system
  • Phishing (electronic fraud)
  • Unauthorized addition of additional rights and capabilities to registered users of the system
  • Transfer or distribution of confidential information.

Direct attack
In the" pre-electronic era", social engineering was used by intruders who made phone calls. For example, in order to gain access to the phone company's subscriber database, it was enough to call there and introduce yourself as a customer service employee performing a routine check, or an employee of the authorities clarifying the data. The main thing is to choose the right tone. This method is still valid, and modern telephony tools only make it easier for hackers to do this. So, with the help of a special prefix to the phone, the caller can change the timbre of the voice.

Incredibly, but the fact is: in a special study, 7 out of 10 office workers at London Waterloo station gave their username and password to a stranger in exchange for a chocolate bar!

With the spread of computers, the possibilities of social engineering have expanded. Now you can use email or ICQ to attack. Sometimes you don't even need to fake the style of the person you're writing in, and the employee still won't suspect anything. For example, a person receives a "letter from their superiors": "Please send me a copy of the Northern Federal District customer database in MS Excel format by 15.00 today, March 5." It will, of course, send-and forgive-goodbye-secret data. Or "a letter from the system administrator": "Dear colleagues!

Gaps in the information system – employees usually:
  • they believe that the corporate security system is infallible, and they lose their vigilance
  • it is easy to believe the information received, regardless of its source
  • they consider compliance with the corporate security policy a waste of time and effort
  • they underestimate the importance of the information they own
  • they sincerely want to help everyone who asks for it
  • they do not realize the harmful consequences of their actions.

A key to each one
In different countries, people are exposed to socioengineering in different ways. Russians are not the most trusting nation, but residents of the United States and Japan are very suggestible. Each country has its own cultural characteristics, which should be taken into account by a social engineer. For example, in the West, the "norm of reciprocity" works perfectly: if a person does something pleasant, he will feel obligated and at the first opportunity will try to repay with kindness.

Regardless of their nationality, new employees are most vulnerable to attacks by social engineers. As a rule, they have not yet had time to learn about all the existing corporate rules, they have not studied the information security regulations. Newcomers don't know all their colleagues yet, especially personally. In addition, they are characterized by increased trust and willingness to help, in order to establish themselves as active and responsive team members who can be relied upon.

You may be under attack if your interlocutor:
  • shows you increased interest, exaggerated attention and care
  • refuses to give you his coordinates
  • makes a strange or unusual request to you
  • trying to ingratiate himself with you or flattering you
  • he speaks to you in an emphatically bossy tone.

Even the most vigilant employees may not always recognize social engineering. Nor should they act as a lie detector. A key success factor is learning. Security policies should be in the flesh and blood of everyone who works for the company. And, of course, before explaining the essence of these policies to employees, you need to develop them.
 
Top