30
“Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

“Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Embed Size (px)

Citation preview

Page 1: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

“Hi, I’m Tom from IT”Social Engineering In the Real World

Tom DeSot

EVP, Chief Information Officer

Page 2: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Background Slide on Tom

Recently Now

R&D Security

Banking

IT

Compliance

CIO

Way Back

Page 3: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Company Background

Founded in 1999, Digital Defense, Inc. (DDI) is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries.

DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability of organizations to reduce risk and keep information, intellectual property and reputations secure.

Page 4: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Agenda

• What is Social Engineering?

• Real World Examples

• Social Engineering Methodologies– Remote Social Engineering– Onsite Social Engineering

• Preventing Social Engineering Attacks

• Questions?

Page 5: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What Is Social Engineering?

• “…the art of manipulating people into performing actions or divulging confidential information.” (Wikipedia)

Page 6: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Cyber War

“It is said that…

If you know your enemies and knowyourself, you will not be imperiled ina hundred battles

If you do not know your enemies butdo know yourself, you will win oneand lose one

If you do not know your enemies noryourself, you will be imperiled in everysingle battle.” Sun Tzu 孫子 ; Sūn Zǐ;

(c. 6th century BC)Chinese General,

Military Strategist,and author of The Art of War

Page 7: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

The Numbers Don’t Lie

48% of enterprises have been victims of social engineering attacks

75% Success rate with social engineering phone calls to businesses

Veracode

Page 8: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Real World Examples

• An individual called into Citibank’s customer service bureau claiming to be Paul Allen (Co-founder of Microsoft)

• Caller claimed he had misplaced his debit card (did not want to report it stolen)

• Caller was able to change the mailing address for the account to his residence in Pittsburgh over the phone

• Had a new card overnighted– Card was used to make a $658 payment to a

bank loan account– Attempted to make a $15,000 wire transfer and

a purchase at Game Stop, but transactions were denied

Source: “FBI Says Citibank Gave Paul Allen’s Debit Card to Thief”, http://www.wired.com/threatlevel/2012/03/paul-allen-debit-card-caper/

Page 9: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Real World Examples

A man dressed as an employee of Brinks walked into a Wachovia branch in downtown Washington D.C. and walked out with more than $350,000.

Wasn’t until the real Brink’s driver showed up did they realize they had been robbed.

Source: http://www.schneier.com/blog/archives/2008/01/socialengineeri.html

Page 10: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Real World Examples

Tareq and Michaele Salahi were able to crash a reception for President Obama

– “They looked like they belonged…”

Page 11: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Remote Social Engineering Tactics

Help Us Out!– Scenario

• Inbound telephone calls to employees

• Caller attempts to persuade a user to visit a fake website and enter his/her credentials to validate their password(s)

• Outbound caller ID is spoofed

• Captures usernames and passwords

Page 12: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Fake Site Example

Page 13: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Remote Social Engineering Tactics

The Patch–Scenario

• Inbound telephone calls to employees

• Direct user to fake website to download and execute the “patch”

• Executable actually sends username, IP address and hostname to Internet

Page 14: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Sample Site

Page 15: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Sample Dialog Box

Page 16: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Remote Social Engineering Tactics

The Patch (E-Mail)– Send e-mails to targeted users to

persuade them to visit a “patch” site to “fix” a zero-day vulnerability

– Similar to Scenario 2 (Phone)– Executable actually sends username,

IP address and hostname to Internet

Page 17: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Fake Email

Page 18: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Remote Social Engineering Tactics

BonusPlan2013.xls– The analyst will drop USB fobs in

areas where employees congregate

– The test focuses on determining if employees will insert unknown removable media into corporate computers

– When inserted, Excel spreadsheets are shown with file names like “BonusPlan2013.xls”

– Excel does not open; the program silently sends the IP address, hostname and username of the individual to a DDI server

Bonus Plan

Page 19: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

How Successful Are We?

95-98%Successful

Page 20: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What Is Onsite Social Engineering?

Onsite Social Engineering uses several onsite testing methods, including…

– attempting to gain physical access to the premises

– attempting to obtain records, files, equipment, sensitive information, network access, etc.

– Attempting to garner information to permit unauthorized network access

Page 21: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Onsite Social Engineering Tactics

Scenario 1: New Employee

– The analyst pretends to be a new employee and enters through employee entrance

– Will typically have already “cased” the organization and will wear the appropriate attire

– Will already have a fake badge before they come onsite

Page 22: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Onsite Social Engineering Tactics

Scenario 2: Trusted Vendor

– The analyst pretends to be someone from a trusted vendor such as the local telephone company, A/C repair, etc.

– Will typically have already called in to see what firms the organization uses

– Shirts are easy to buy at local thrift stores or to have made

Page 23: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

How Successful Are We?

90-95%Successful

Page 24: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What Can You Do to Prevent an Attack?

Page 25: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What About My Badge System?

Page 26: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What About My Door Locks?

Page 27: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

What About My Cameras?

Page 28: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Don’t Give Up!

Page 29: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Remember…Knowledge is Power

Security Awareness TrainingHacking and social engineering can result in data breaches that expose millions of companies worldwide to enormous risks, including financial liability and damage to their brand reputations. Companies that want to protect vial commercial assets and customer data should look to ongoing security training and awareness programs to help build a culture of security.

Page 30: “Hi, I’m Tom from IT” Social Engineering In the Real World Tom DeSot EVP, Chief Information Officer

Questions?

Digital Defense, Inc.

9000 Tesoro Drive, Suite 100

San Antonio, TX 78217

888.273.1412

www.DDIFRONTLINE.COM

[email protected]