68
Why bother breaking down the door if you can simply ask the person inside to let you in? Social engineering works, both during penetration testing and as part of real-world attacks. This briefing explores how attackers are using social engineering to compromise defenses. It presents specific and concrete examples of how social engineering techniques succeeded at bypassing information security defenses. These materials are designed to help you improve the relevance of your security awareness training and to adjust your data defenses by revisiting your perspective of the threat landscape. 1 Copyright 2010-2011 Lenny Zeltser

Lenny zeltser social engineering attacks

Embed Size (px)

Citation preview

Page 1: Lenny zeltser   social engineering attacks

Why bother breaking down the door if you can simply ask the person inside to let you in? Social engineering works, both during penetration testing and as part of real-world attacks. This briefing explores how attackers are using social engineering to compromise defenses. It presents specific and concrete examples of how social engineering techniques succeeded at bypassing information security defenses. These materials are designed to help you improve the relevance of your security awareness training and to adjust your data defenses by revisiting your perspective of the threat landscape.

1 Copyright 2010-2011 Lenny Zeltser

Page 2: Lenny zeltser   social engineering attacks

Just like “con artists” have done for centuries.

Copyright 2010-2011 Lenny Zeltser 2

Page 3: Lenny zeltser   social engineering attacks

As the result, outsider == insider, since someone is bound to let an outsider in.

Copyright 2010-2011 Lenny Zeltser 3

Page 4: Lenny zeltser   social engineering attacks

This may help with educating users, customers and security staff. This may also help in adjusting the security architecture.

Copyright 2010-2011 Lenny Zeltser 4

Page 5: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 5

Page 6: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 6

Page 7: Lenny zeltser   social engineering attacks

http://isc.sans.org/diary.html?storyid=5797

Copyright 2010-2011 Lenny Zeltser 7

Page 8: Lenny zeltser   social engineering attacks

http://blogs.paretologic.com/malwarediaries/index.php/2011/09/30/trademark-rogue-business/

Copyright 2010-2011 Lenny Zeltser 8

Page 10: Lenny zeltser   social engineering attacks

http://www.bankinfosecurity.com/articles.php?art_id=1858

Copyright 2010-2011 Lenny Zeltser 10

Page 11: Lenny zeltser   social engineering attacks

… with an element of social engineering.

Copyright 2010-2011 Lenny Zeltser 11

Page 12: Lenny zeltser   social engineering attacks

Conficker set up the autorun.inf file on infected USB keys so that the worm would run when the victim inserted the USB key into a computer, thereby infecting the PC. The autorun.inf file that Conficker created on the USB key was carefully crafted to confuse the user once the key was inserted into the computer. When the victim inserted the USB key, Windows typically brought up the AutoPlay dialog box, asking the person what to do next. Normally, the AutoPlay action box presents the user with options to run the program on the USB key or to browser the USB key’s files. The autorun.inf file that Conficker created manipulated the options presented to the user, so that the option to run the program looked like the option to browse the drive’s contents. The user was likely to click on the first option to browse the files, not realizing the he or she is actually launching a program. As a result, the user inadvertently launched the Conficker worm from the USB key and infected the PC. http://isc.sans.org/diary.html?storyid=5695

Copyright 2010-2011 Lenny Zeltser 12

Page 13: Lenny zeltser   social engineering attacks

Gawker sites include Gimodo, Lifehacker and TechCrunch. http://www.wired.com/threatlevel/2009/09/nyt-revamps-online-ad-sales-after-malware-scam/ “The culprit masqueraded as a national advertiser and provided seemingly legitimate product advertising for a week.” ... “Over the weekend, the ad being served up was switched so that an intrusive message, claiming to be a virus warning from the reader’s computer, appeared.”

Copyright 2010-2011 Lenny Zeltser 13

Page 14: Lenny zeltser   social engineering attacks

http://www.businessinsider.com/henry-blodget-gawker-scammed-by-malware-pretending-to-be-suzuki-2009-10

Copyright 2010-2011 Lenny Zeltser 14

Page 16: Lenny zeltser   social engineering attacks

Impersonated a legitimate advertising company

Copyright 2010-2011 Lenny Zeltser 16

Page 17: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 17

Page 18: Lenny zeltser   social engineering attacks

http://uk.answers.yahoo.com/question/index?qid=20100614105319AAznWTW

Copyright 2010-2011 Lenny Zeltser 18

Page 20: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 20

Page 21: Lenny zeltser   social engineering attacks

http://www.securelist.com/en/blog/208193029/ZeuS_in_the_Mobile_for_Android

Copyright 2010-2011 Lenny Zeltser 21

Page 22: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 22

Page 23: Lenny zeltser   social engineering attacks

Consider a variant of the Waledac worm. The worm directed its potential victims to a website that showed a news excerpt about a supposed explosion. The message was localized based on where the user was connecting from. For instance, visitors from New York would see a message “Powerful explosion burst in New York this morning.” The person was asked to download a video player for the full story. Personalization of the message increased the likelihood of the person downloading the trojan player in an attempt to see the video. http://securitylabs.websense.com/content/Alerts/3321.aspx

Copyright 2010-2011 Lenny Zeltser 23

Page 25: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 25

Page 27: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 27

Page 28: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 28

Page 31: Lenny zeltser   social engineering attacks

Attackers have been conducting the “stuck in London” scam for several years. Early campaigns were relying on compromised webmail accounts to reach potential victims through email. In an example recently documented by Rakesh Agrawal, this classic scam was conducted via Facebook chat. The scammer used a compromised Facebook account in an attempt to solicit emergency funds from the victim’s friend. The screenshot on this slide shows an excerpt from the chat transcript. With low-cost labor available throughout the world, scammers can employ humans for chatting with victims while keeping their costs relatively low. The scammer was using Matt’s Facebook account and, as far as I can tell, was a human being. However, such interactions could have easily been automated using a chat bot. For details regarding this Facebook chat scam see: http://rake.sh/blog/2009/01/20/facebook-fraud-a-transcript

Copyright 2011 Lenny Zeltser 31

Page 32: Lenny zeltser   social engineering attacks

Consider a scam that promises Facebook users to find out who has been viewing their Facebook profile. The implication is that the user can get access to these details (that feed the narcissist in all of us) by installing the Profile Spy application. The scam attempts to trick the victim into revealing personal details, including a mobile phone number. The malicious site shows a fake Facebook page in the background, to make victims think they are within the “walled garden” of Facebook…

32 Copyright 2011 Lenny Zeltser

Page 33: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 33

Page 34: Lenny zeltser   social engineering attacks

After infecting the computer, one malware specimen edited the victim’s “hosts” file to redirect attempts to connect to technology product review sites, including CNet, PCMag, and ZDNet. The goal seemed to provide the victim with a spoofed review of a fake anti-virus tool “Anti-Virus-1” to trick the person into purchasing this software. Fake anti-virus is not unlike the fake pen for detecting counterfeit money. For additional details about this incident, see: http://www.bleepingcomputer.com/forums/topic204619.html

Copyright 2010-2011 Lenny Zeltser 34

Page 35: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 35

Page 36: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 36

Page 37: Lenny zeltser   social engineering attacks

Koobface spread by including links to malicious websites in Twitter and Facebook profiles. Once the potential victim clicked on the link, he or she was typically directed to a website that attempted to trick the person into installing malware. A common tactic involved presenting the user with a message that to view the video, a Flash Player upgrade was required. Of course, the executable the person was presented was not Flash Player, but was malware.

Copyright 2010-2011 Lenny Zeltser 37

Page 38: Lenny zeltser   social engineering attacks

The malicious website embedded, though a series of steps, a Facebook page in an invisible iframe that floated above the button that the user click on. The victims didn’t realize that they were actually clicking on the Facebook “Share” button, which shared the malicious website with the victim’s Facebook friends. http://fitzgerald.blog.avg.com/2009/11/new-facebook-worm-dont-click-da-button-baby.html

Copyright 2010-2011 Lenny Zeltser 38

<html><head></head><body><div style=”overflow: hidden; width: 56px; height: 24px; position: relative;” id=”div”> <iframe name=”iframe” src=”http://EVILURI/index.php?n=632″ style=”border: 0pt none ; left: -985px; top: -393px; position: absolute; width: 1618px; height: 978px;” scrolling=”no”></iframe></div></body></html>

HTML Source: theinvisibleguy

Page 40: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 40

Page 42: Lenny zeltser   social engineering attacks

This is a sample screenshot—not representative of the sites manipulated by Nugache.

Copyright 2010-2011 Lenny Zeltser 42

Page 43: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 43

Page 44: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 44

Page 46: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 46

Page 47: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 47

Page 48: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 48

Page 49: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 49

Page 50: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 50

Page 51: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 51

Page 52: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 52

Page 55: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 55

Page 56: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 56

Page 57: Lenny zeltser   social engineering attacks

There is no “Google Approved Pharmacy Directory”

Copyright 2010-2011 Lenny Zeltser 57

Page 58: Lenny zeltser   social engineering attacks

http://www.f-secure.com/weblog/archives/00002017.html “I contacted the company and asked them whether they were aware that their code signing certificate had been stolen. The case became more interesting to me when they responded that they do not have any code signing certificates. In fact, they don't produce software — so they don't have anything to sign. Clearly someone else had obtained the certificate in their name; they had been victim of identity theft.”

Copyright 2010-2011 Lenny Zeltser 58

Page 59: Lenny zeltser   social engineering attacks

Left side: cert obtained through identity theft: http://www.f-secure.com/weblog/archives/00002017.html Right side: stolen cert used to sign Stuxnet: http://www.f-secure.com/weblog/archives/00001993.html

Copyright 2010-2011 Lenny Zeltser 59

Page 60: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 60

Page 62: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 62

Page 63: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 63

Page 64: Lenny zeltser   social engineering attacks

Need solid research: Will training users or customers in social engineering tactics improve their resistance to scams?

Copyright 2010-2011 Lenny Zeltser 64

Page 65: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 65

Page 66: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 66

Page 67: Lenny zeltser   social engineering attacks

Copyright 2010-2011 Lenny Zeltser 67

Page 68: Lenny zeltser   social engineering attacks

If you have any questions for me, please let me know. I’ll do my best to answer them as accurately as I can. I’d also love to hear from you if you have any comments regarding this briefing, either what you liked about it, or your suggestions for improving it. If you want to keep an eye on my research and related activities, take a look at blog.zeltser.com. You can also find me on Twitter at twitter.com/lennyzeltser.

68 Copyright 2010-2011 Lenny Zeltser