bsidespgh - never surrender - reducing social engineering risk

45
NEVER SURRENDER Reducing social engineering risk Rob ragAn @sweepthatleg Christina Camilleri @0xkitty

Upload: rob-ragan

Post on 30-Jul-2015

2.803 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

NEVER SURRENDER Reducing social engineering risk Rob ragAn @sweepthatleg

Christina Camilleri @0xkitty

Page 2: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Shower Foo What if I say I’m not like the others

What if I say I’m not just another one of your plays

You’re the pretender

What if I say I will

never surrender

Page 3: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Who The…

Page 4: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Let’s get our hands dirty

Page 5: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

What is social engineering?

Page 6: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

An exploitation of TRUST Someone who can leverage the trust of their victim to gain access to sensitive information or resources or to elicit information about those resources

Page 7: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We are professional liars.

Page 8: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

People are Vulnerable And WE are lazy and we want to be helpful and we WANT to be noticed.

Page 9: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

And social engineering is the path of least resistance.

Page 10: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

the biggest issue we face in infosec.

Page 11: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We are the root of all evil, and the reason for all security issues.

Page 12: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

There is no patch for human stupidity.

Page 13: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

People – psychology Computers – Technology

When it comes to security, We are unreliable.

Page 14: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Technical systems are: reviewed scanned penetration tested

Page 15: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

But…

Page 16: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

How do we measure vulnerability in people?

Page 17: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We don’t. We SHAME and Blame. We make them feel bad for their behavior. We are Ignorant. *And we’re not doing anything to effectively change this.

Page 18: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We avoid testing because it makes us feel vulnerable.

Page 19: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

And we don’t like to feel vulnerable.

Page 20: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

psychology + Technology =

Page 21: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We fall victim to basic psychological and physical needs:

Page 22: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Cialdini 6 Authority Liking Social Proof Scarcity Reciprocity Commitment and Consistency

Page 23: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Let me Tell you a story.

Page 24: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Let me Show you how.

Page 25: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Information gathering

Developing a relationship

exploitation

execution

Page 26: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

What are we doing wrong?

Page 27: BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Page 28: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Almost everything.

Page 29: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

We watch videos We do e-learning modulesWe tick boxesWe make posters

And generally feel good about ourselves.

Page 30: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

No. You’re doing it wrong too.

Page 31: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Tracking. Frequency. Conditioning.

Page 32: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Tracking. Stop tracking clicks Stop tracking by department Don’t track failed attempts track successes

Page 33: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Track successful reported incidents. The graph should ideally go up not down. 

Page 34: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Awareness training should feed a strong SE specific IR plan

Page 35: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Frequency. Stop shoving awareness training down people’s throats.

Page 36: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Conditioning. Stop using negative reinforcement. Use positive reinforcement.

Page 37: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Let me Tell you another story.

Page 38: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

How do we plan to fix this?

Page 39: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

A multi-phased cyclical approach: 

SE > PT > IR > PPP > ES >

SE > PT > ... Rinse, repeat

Page 40: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

How do we plan to fix this?

Page 41: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Strategic Next Steps1.  Alias for reporting incidents2.  Implement anti-email spoofing (SPF, DKIM, DMARC)3.  Disable HTML in SMTP (plaintext emails FTW)4.  Sandbox the browser and the email client

Page 42: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Strategic Next Steps1.  Alias for reporting incidents2.  Implement anti-email spoofing (SPF, DKIM, DMARC)3.  Disable HTML in SMTP (plaintext emails FTW)4.  Sandbox the browser and the email client5.  Browser plugins6.  Org wide web proxy7.  Alert on org relevant [phishing] domains8.  Customization of authN to mitigate cloning

Page 43: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Strategic Next Steps1.  Alias for reporting incidents2.  Implement anti-email spoofing (SPF, DKIM, DMARC)3.  Disable HTML in SMTP (plaintext emails FTW)4.  Sandbox the browser and the email client5.  Browser plugins6.  Org wide web proxy7.  Alert on org relevant [phishing] domains8.  Customization of authN to mitigate cloning 9.  Application whitelisting10.  Encrypt sensitive data (in transit & at rest)11.  Enforce a VPN when not on internal network12.  Perform regular simulated SE for a more prepared IR team

Page 44: BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Questions? Special Thanks @lady_nerd @CandySaur @lunarca_ @tastic007 @Napordie

Rob ragAn @sweepthatleg

Christina Camilleri @0xkitty

Page 45: BSidesPGH - Never Surrender - Reducing Social Engineering Risk