ntxissacsc4 - the rise of social engineering -- anatomy of a full scale attack

27
The Rise of Social Engineering - Anatomy of a Full Scale Attack - Presenter: Dave Nelson, CISSP | President at Integrity

Upload: north-texas-chapter-of-the-issa

Post on 16-Apr-2017

390 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

TheRiseofSocialEngineering- AnatomyofaFullScaleAttack-

Presenter:DaveNelson,CISSP|PresidentatIntegrity

Page 2: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

DaveNelson,CISSP• CertifiedInformationSecurityProfessional(CISSP)

• Over20yearsexperienceasinformationsecurityprofessional

• FellowwiththeInformationSystemsSecurityAssociation

• PresidentEmeritusofISSADesMoinesIowaChapter

Page 3: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Overview

Whatis“SocialEngineering”?

TypesofAttacks&RealWorldExamples

BestDefense

Page 4: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Whatis“SocialEngineering”?WHAT IS

SOCIALENGINEERING?

Page 5: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Social Engineering

• Usingknowledgeofhumanbehaviortoelicitadefinedresponse.

• Putsimply…gettingyoutowillinglydosomethingformewhichislikelynotinyourbestinterest.

Page 6: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Sociology and Psychology

• Studyofhumanbehavior,interactionandsocietalnorms.

• Actionscanbepredictedquiteaccurately.

• Actionscanalsobeinfluencedquiteeasily.

Page 7: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Simple Human Behavior

• TwoTypesofResponses– Natural– Learned

Hackerswillcraftascenarioforyoutoenter,inordertoelicitaresponsewhichtheybelievewillgivethemtheresulttheyarelookingfor.

Page 8: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

TypesofAttacks&RealWorldExamples

Page 9: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Why talk about social engineering

Socialengineeringisacomponentoftheattackinnearly1of3successfuldatabreaches,andit’sontherise.

Source:2016VerizonDataBreachInvestigationReport

Page 10: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

5CommonAttackMethods

DumpsterDiving

Pretexting

Phishing

PhysicalEntry

Enticement

Page 11: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Dumpster Diving

• Scouringthroughdiscardeditems– Calendars&Dayplanners– Handwrittennotes– Phone&EmailLists– Operationmanualsorprocedures– Systemdiagrams&IPaddresses– Sourcecode

Page 12: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Pretexting

• Fraudulentphonecalls• Usedtoextractinformation• Alsousedtosetupotherattackssuchasfacilityentryorphishing

Page 13: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Phishing

Attemptstogetuserstoprovideinformationorperformanaction

TipsForIdentifyingPhishingAttempts– Askstoupdateaccountinformationviaemail– Noverificationimageorvaryinglayoutdesigns– Providesunfamiliarhyperlinks

Page 14: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Common Bait

• SweetDeals– FreeStuff– LimitedTimeOffers– PackageDelivery

• HelpMe,HelpYou!– TechSupport

• YouGotta’SeeThis!

Page 15: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Spear Phishing Example

GoodMorningMike,

Youmayormaynotknow,butMary(CFO)andIareinAtlantaworkingtocloseadealwithourpartnersXYZCompanyandABCLimitedona$70milliondollarcontractwithOurBigPayday,Inc.Inordertogetthecontractssigned,Ineedyoutowire$85,620toXYZCompanyand$67,980toABCLimited.MarysaysthisshouldcomefromourBankNameHereaccountnumber123456789.TheroutingandaccountnumberforXYZis12345678– 7788994455andforABCis98765432–336699774411.

BecauseOurBigPayday,Inc.isapubliclytradedcompany,thetermsofthisagreementcannotbediscloseduntiltheyfiletheirSECreportsforthequartersoyourabsolutediscretionisexpected.Undernocircumstancesareyoutodiscussthistransactionwithanyoneinthedepartment.AleakcouldresultinSECfinesorprisonforbothofusforinsidertrading.Ifyouhaveanyquestionsaboutthis,pleaserespondtothisemailwithyourdirectlineandI’llcallyouwhenI’moutofthenegotiationmeetings.IappreciateallyoudoforuswhichiswhyI’mtrustingyouwiththiskeyproject.

Keepupthegoodwork!Sandy(CEO)

Page 16: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Physical Presence

• Gainingphysicalaccesscanbeeasierthanvirtualaccess

• Mayprovideadditionalinformation

• Comesatahigherriskbutwithapotentiallygreaterreward

Page 17: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Physical Presence Examples• DeliveryDrivers• EmployeeTailgating• MaintenanceorEmergencyCrews

• Thekeyistoactlikeyoubelong.Ifyoubelieveitsowilleveryoneelse.

Page 18: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Enticement Examples

Afolderwithenticingtitle/labelleftongroundoutsideanemployeeentrancewithaUSBthumbdrivetapedinside.

• USB,CDorDVDsleftinconspicuousspaces.

• Maybeaccompaniedbyfakepaperfiles

• Curiositybeatscaution

Year-EndBonuses

Page 19: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Putting It All Together

• Targetedattackswillalwaysusesomeformofsocialengineering.

• Justlikeinmilitaryoperations,intelmakesorbreaksamission

• Hackersmayneverevenneedtousesophisticatedtechnicalattacksifyouprovidetheinformationwillingly

Page 20: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Stealth Mode

• Limitedsocialengineeringattackscanbehardtodetect.

• Relevantinformationallowsattackerstopinpointtheirattackwhichmakestheirfootprinthardtodiscover.

Page 21: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Don’t Fall for The Long Con

• Socialengineeringisnothingmorethanacon-game.

• Theold“LongCon”hasbeenportedtothedigitalworld.

• Goodconsarehardtospot.

Page 22: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

BestDefenses

Page 23: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Best Defenses

• Strongpaperdestructionprocess• Limitingfacilityingress/egresspoints• Challengeunknownpeopleinsecureareas• Implementtechnologytoscreenemailandwebsitesforattacks

Page 24: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Employee Training

• TraditionalCBTmethodsdon’twork• Engagetheemployee,makeapersonalplea• Usegamificationtoenhancelearning• Preparefordifferentlearningstyles(audio,visual,hands-on)

• Awarenessisnottrainingandtrainingisnotawareness

Page 25: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Program Validation

• Socialengineeringtestingengagementsprovideassessmentsofhowwellyourpeople,processandtechnologyarefunctioning.

Page 26: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Summary

• Socialengineeringisheretostayandit’sgrowing• Yourorganizationwillsufferadatabreachduetosocialengineering

• Thestudyofhumanbehaviorhasbeenusedbycriminalsforcenturies,cybercriminalsarenodifferent

• Employeesmustbetrainedtospotsocialengineeringandhowtoreact

Page 27: NTXISSACSC4 - The Rise of Social Engineering -- Anatomy of a Full Scale Attack

Question & Answer

[email protected]

www.integritysrc.com/blog

DaveNelsonCISSP

@IntegrityCEO- @IntegritySRC

515-965-3756