SlideShare une entreprise Scribd logo
1  sur  30
Social Engineering and
What To Do About It
Aleksandr Yampolskiy, Ph.D.
Director of Security and Compliance, Gilt Groupe
 Security decisions are based on risk, not
just threats and vulnerabilities.
 The roadmap aims to mitigate top risks.
 Heavily based on policy and user
education.
 “Onion security” – multiple protections at
each layer.
 Achieve “essential”, then worry about
“excellent”.
 Be a “how team” instead of a “no team”.
Our Approach to Security
Social engineering in person
See anything wrong?
Social engineering in person
 Types of social engineering
– In person
– Phone
– Email
– Websites
– …the list doesn’t end there…
Social Engineering
• It’s an old-fashioned manipulation of people.
• The goal is to obtain sensitive information about a
company (password, financials, customer info, etc.)
• Organizations are too focused on technological
security controls, but often the weakest link is
people!
What is Social Engineering?
Gartner 2002
 Social engineering is not as glamorous as it
sounds and requires lots of groundwork
1. Information gathering
2. Idle chit-chat
3. Assuming different personas
4. Getting what you want.
 It can be very easy or very hard and yields largest
rewards.
What is Social Engineering? (cont.)
Gartner 2002
 Four categories of attacks:
1. Direct request
– Usually the least likely to succeed
2. Contrived situation
– Additional factors the victim must consider
3. Walking the walk, talking the talk
– Service person, employee, carry clipboard
4. Personal persuasion
– Make victim believe she is in control
Types of Social Engineering Attacks
 Bold impersonation
– Impersonate another employee.
 Learn the lingo
– Sound like an employee, using company
jargon and dropping names of other
employees.
 Fragmentation
– Gather info one piece at a time across
multiple conversations.
 Avoid detection
– Different callers
Building Blocks
 Social Engineering’s goal is to influence
the victim to reveal sensitive information!
Caldini’s Six Principles of Influence
 Six elements to influence in social
engineering:
1. Authority = “Wearing uniform, …” “People highly responsive
without question to those with authority”.
2. Scarcity = “Sense of urgency”
3. Similarity = “People are comfortable with those similar to
themselves”. “Same problems at work, same interests,
political frustrations, etc.”
4. Reciprocation = “Something for something” “But you agreed!”
5. Commitment = “What people do today they will likely do
tomorrow”
6. Social proof = “He knows William’s cell, so he must be
important”
Caldini’s Six Principles of Influence
 Social engineer tricks you into asking him
for help.
 Sabotage
– Create a paper jam on a printer.
 Advertising
– Leave a business card, advertising attacker’s
services to fix PCs.
 Assisting
– Attacker assists a victim with the solution.
Reverse Social Engineering
From: Alan Davis <alan@acrne.com>
To: Cheryl Hines <cheryl.hines@example.com>
Cheryl,
I just called Bob on his cell phone to ask if he could send me a copy of
the press release that is to go later today. He was picking up his
daughter Jennifer from school and he asked me to reach out to you.
Can you please send me a copy right away? It’s a little urgent, as you
can imagine.
• Bob was enjoying his lunch with coworkers in a Thai place next to the
office.
• He casually mentioned that today a press release for Acme will be
issued, and that he’ll be taking off early to pick up his daughter Jen from
school.
• At 2:15 pm, his secretary Cheryl received an email followed up by a
frantic call from Alan. Since Bob was away, she promptly sent him the
release.
Real Example. Names have been changed.
Yet another example. Is your organization safe?
• Yes, hi – Gilt Customer Support?
• This is Aleksandr Yampolskiy. I am on vacation in Dominican and I can’t log
in to Gilt site. Could you reset my password?
• Sure, my email is ayampolskiy@gilt.com and address is 135 East 50th Street,
NY, NY
• Thank you so much!
Yet another example.
 All people are naturally helpful and
especially Customer Support… since their
job is to help!
 Generally not trained to question validity of
each call.
 That makes them prime targets for social
engineering.
Customer Support
• You must have at least 1.5 points to verify the identity of a customer if they
have previously placed an order.
• You must have at least 1 point if no orders were placed.
• Do not provide information unrelated to the user’s account (users calling
regarding spending habits of children, spouse, etc. cannot be discussed).
• Password resets can be requested over the phone, but first verify the identity,
then send the password by e-mail.
Customer Identification
 Recognize when the situation comes.
 Don’t be afraid to say “NO!”
 Incident response policy.
Defenses
 Spear phishing. Targeted email which
appears to be coming from your colleague
or a friend.
 Nigerian scam aka 419 scam. Forward
money in hopes of financial gain.
 PDF, JPEG, EXE attachments with
greeting cards, images, documents.
Social Engineering by Email
Lovebug virus
Security Awareness
E-Mail Usage:
• What do suspicious E-Mails look like?
Security Awareness
E-Mail Usage:
• What do suspicious E-Mails look like?
Security Awareness
E-Mail Usage:
• What do suspicious E-Mails look like?
Original
Response 1
Response 2
 Some advice to stay safe:
1. Don’t assume that email is legit even if you get it from a colleague or a
friend.
2. Companies, like PayPal, always address their customers by their
username in emails, so if an email addresses a user in a generic
fashion ("Dear PayPal customer") it is likely to be an attempt at
phishing.
3. Be cautious about posting your e-mail address on public web sites.
4. Disguise your e-mail address when you post it to a newsgroup, chat
room, bulletin board
5. Use multiple e-mail addresses for different purposes. E.g. use one to
correspond with friends, colleagues and another for public forums.
6. Do not reply to spam
7. If you have a website or blog use an encoded, e-mail address on the
site.
8. Use your common judgment or ask security@
Stay Safe - Phishing
Social engineering via websites
 Many of these viruses spread through
social sites (a user is 10x more likely to
open them than via email)
Malware has many shapes and forms
 A concrete example: Erin Andrews is an ESPN
sportscaster, who was secretly videotaped through
hotel peephole in July 09.
 Shortly thereafter, a site video.report-cnn.com hosting
the tape appeared.
Fake Youtube videos
LIVE VIDEO PLAYER
BLOCKED
Your popup blocker has
blocked access to the
Video Player. To view
your video, please launch
the Live Video Player
below.
 Spear Phishing – a highly targeted
phishing attack
 Disguised as a legitimate communication
 Giltcorp.com is not owned or operated by
Gilt
Social Engineering
Social Engineering
 Incident response policy, outlining steps to
take if a phishing website resembling Gilt
is detected.
 Buy similar-sounding domains.
 Block these sites at firewall level.
 Education. Test your users if they fall for it!
Preventing social engineering on the web
Any questions?

Contenu connexe

Tendances

Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boardsPaul McGillicuddy
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorJames Krusic
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineeringthetacker
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider ThreatPECB
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.Pratum
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 

Tendances (20)

Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 

En vedette

Building a Cyber Range - Kevin Cardwell
Building a Cyber Range - Kevin CardwellBuilding a Cyber Range - Kevin Cardwell
Building a Cyber Range - Kevin CardwellEC-Council
 
social engineering
 social engineering social engineering
social engineeringRavi Patel
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question CollectionManish Luintel
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringCyber Agency
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.worldstuff
 

En vedette (9)

Building a Cyber Range - Kevin Cardwell
Building a Cyber Range - Kevin CardwellBuilding a Cyber Range - Kevin Cardwell
Building a Cyber Range - Kevin Cardwell
 
social engineering
 social engineering social engineering
social engineering
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
Skimming & Scanning
Skimming & ScanningSkimming & Scanning
Skimming & Scanning
 
How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.How ATM card skimming and PIN capturing scams work.
How ATM card skimming and PIN capturing scams work.
 

Similaire à Social Engineering and What to do About it

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.fificoco
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3jesusmlaz
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Beth Sallay
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 

Similaire à Social Engineering and What to do About it (20)

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Spam as social engineering presentation.
Spam as social engineering presentation.Spam as social engineering presentation.
Spam as social engineering presentation.
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Student book key unit3
Student book key unit3Student book key unit3
Student book key unit3
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
Users guide
Users guideUsers guide
Users guide
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 

Plus de Aleksandr Yampolskiy

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionAleksandr Yampolskiy
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter BellAleksandr Yampolskiy
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsAleksandr Yampolskiy
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItAleksandr Yampolskiy
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingAleksandr Yampolskiy
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsAleksandr Yampolskiy
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of virusesAleksandr Yampolskiy
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Aleksandr Yampolskiy
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsAleksandr Yampolskiy
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networksAleksandr Yampolskiy
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysAleksandr Yampolskiy
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelementAleksandr Yampolskiy
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topologyAleksandr Yampolskiy
 

Plus de Aleksandr Yampolskiy (20)

New York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome SessionNew York REDIS Meetup Welcome Session
New York REDIS Meetup Welcome Session
 
"Managing software development" by Peter Bell
"Managing software development" by Peter Bell"Managing software development" by Peter Bell
"Managing software development" by Peter Bell
 
Recruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy StepsRecruiting Great Engineers in Six Easy Steps
Recruiting Great Engineers in Six Easy Steps
 
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing ItYou Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
 
Malware Goes to the Movies - Briefing
Malware Goes to the Movies - BriefingMalware Goes to the Movies - Briefing
Malware Goes to the Movies - Briefing
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Eight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programsEight simple rules to writing secure PHP programs
Eight simple rules to writing secure PHP programs
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
OWASP Much ado about randomness
OWASP Much ado about randomnessOWASP Much ado about randomness
OWASP Much ado about randomness
 
Malware goes to the movies
Malware goes to the moviesMalware goes to the movies
Malware goes to the movies
 
Inoculation strategies for victims of viruses
Inoculation strategies for victims of virusesInoculation strategies for victims of viruses
Inoculation strategies for victims of viruses
 
Number theory lecture (part 1)
Number theory lecture (part 1)Number theory lecture (part 1)
Number theory lecture (part 1)
 
Number theory lecture (part 2)
Number theory lecture (part 2)Number theory lecture (part 2)
Number theory lecture (part 2)
 
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
 
Threshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random PermutationsThreshold and Proactive Pseudo-Random Permutations
Threshold and Proactive Pseudo-Random Permutations
 
Secure information aggregation in sensor networks
Secure information aggregation in sensor networksSecure information aggregation in sensor networks
Secure information aggregation in sensor networks
 
A verifiable random function with short proofs and keys
A verifiable random function with short proofs and keysA verifiable random function with short proofs and keys
A verifiable random function with short proofs and keys
 
Towards a theory of data entangelement
Towards a theory of data entangelementTowards a theory of data entangelement
Towards a theory of data entangelement
 
Price of anarchy is independent of network topology
Price of anarchy is independent of network topologyPrice of anarchy is independent of network topology
Price of anarchy is independent of network topology
 
Business Case Studies
Business Case Studies Business Case Studies
Business Case Studies
 

Social Engineering and What to do About it

  • 1. Social Engineering and What To Do About It Aleksandr Yampolskiy, Ph.D. Director of Security and Compliance, Gilt Groupe
  • 2.  Security decisions are based on risk, not just threats and vulnerabilities.  The roadmap aims to mitigate top risks.  Heavily based on policy and user education.  “Onion security” – multiple protections at each layer.  Achieve “essential”, then worry about “excellent”.  Be a “how team” instead of a “no team”. Our Approach to Security
  • 3. Social engineering in person See anything wrong?
  • 5.  Types of social engineering – In person – Phone – Email – Websites – …the list doesn’t end there… Social Engineering
  • 6. • It’s an old-fashioned manipulation of people. • The goal is to obtain sensitive information about a company (password, financials, customer info, etc.) • Organizations are too focused on technological security controls, but often the weakest link is people! What is Social Engineering? Gartner 2002
  • 7.  Social engineering is not as glamorous as it sounds and requires lots of groundwork 1. Information gathering 2. Idle chit-chat 3. Assuming different personas 4. Getting what you want.  It can be very easy or very hard and yields largest rewards. What is Social Engineering? (cont.) Gartner 2002
  • 8.  Four categories of attacks: 1. Direct request – Usually the least likely to succeed 2. Contrived situation – Additional factors the victim must consider 3. Walking the walk, talking the talk – Service person, employee, carry clipboard 4. Personal persuasion – Make victim believe she is in control Types of Social Engineering Attacks
  • 9.  Bold impersonation – Impersonate another employee.  Learn the lingo – Sound like an employee, using company jargon and dropping names of other employees.  Fragmentation – Gather info one piece at a time across multiple conversations.  Avoid detection – Different callers Building Blocks
  • 10.  Social Engineering’s goal is to influence the victim to reveal sensitive information! Caldini’s Six Principles of Influence
  • 11.  Six elements to influence in social engineering: 1. Authority = “Wearing uniform, …” “People highly responsive without question to those with authority”. 2. Scarcity = “Sense of urgency” 3. Similarity = “People are comfortable with those similar to themselves”. “Same problems at work, same interests, political frustrations, etc.” 4. Reciprocation = “Something for something” “But you agreed!” 5. Commitment = “What people do today they will likely do tomorrow” 6. Social proof = “He knows William’s cell, so he must be important” Caldini’s Six Principles of Influence
  • 12.  Social engineer tricks you into asking him for help.  Sabotage – Create a paper jam on a printer.  Advertising – Leave a business card, advertising attacker’s services to fix PCs.  Assisting – Attacker assists a victim with the solution. Reverse Social Engineering
  • 13. From: Alan Davis <alan@acrne.com> To: Cheryl Hines <cheryl.hines@example.com> Cheryl, I just called Bob on his cell phone to ask if he could send me a copy of the press release that is to go later today. He was picking up his daughter Jennifer from school and he asked me to reach out to you. Can you please send me a copy right away? It’s a little urgent, as you can imagine. • Bob was enjoying his lunch with coworkers in a Thai place next to the office. • He casually mentioned that today a press release for Acme will be issued, and that he’ll be taking off early to pick up his daughter Jen from school. • At 2:15 pm, his secretary Cheryl received an email followed up by a frantic call from Alan. Since Bob was away, she promptly sent him the release. Real Example. Names have been changed.
  • 14. Yet another example. Is your organization safe?
  • 15. • Yes, hi – Gilt Customer Support? • This is Aleksandr Yampolskiy. I am on vacation in Dominican and I can’t log in to Gilt site. Could you reset my password? • Sure, my email is ayampolskiy@gilt.com and address is 135 East 50th Street, NY, NY • Thank you so much! Yet another example.
  • 16.  All people are naturally helpful and especially Customer Support… since their job is to help!  Generally not trained to question validity of each call.  That makes them prime targets for social engineering. Customer Support
  • 17. • You must have at least 1.5 points to verify the identity of a customer if they have previously placed an order. • You must have at least 1 point if no orders were placed. • Do not provide information unrelated to the user’s account (users calling regarding spending habits of children, spouse, etc. cannot be discussed). • Password resets can be requested over the phone, but first verify the identity, then send the password by e-mail. Customer Identification
  • 18.  Recognize when the situation comes.  Don’t be afraid to say “NO!”  Incident response policy. Defenses
  • 19.  Spear phishing. Targeted email which appears to be coming from your colleague or a friend.  Nigerian scam aka 419 scam. Forward money in hopes of financial gain.  PDF, JPEG, EXE attachments with greeting cards, images, documents. Social Engineering by Email Lovebug virus
  • 20. Security Awareness E-Mail Usage: • What do suspicious E-Mails look like?
  • 21. Security Awareness E-Mail Usage: • What do suspicious E-Mails look like?
  • 22. Security Awareness E-Mail Usage: • What do suspicious E-Mails look like? Original Response 1 Response 2
  • 23.  Some advice to stay safe: 1. Don’t assume that email is legit even if you get it from a colleague or a friend. 2. Companies, like PayPal, always address their customers by their username in emails, so if an email addresses a user in a generic fashion ("Dear PayPal customer") it is likely to be an attempt at phishing. 3. Be cautious about posting your e-mail address on public web sites. 4. Disguise your e-mail address when you post it to a newsgroup, chat room, bulletin board 5. Use multiple e-mail addresses for different purposes. E.g. use one to correspond with friends, colleagues and another for public forums. 6. Do not reply to spam 7. If you have a website or blog use an encoded, e-mail address on the site. 8. Use your common judgment or ask security@ Stay Safe - Phishing
  • 25.  Many of these viruses spread through social sites (a user is 10x more likely to open them than via email) Malware has many shapes and forms
  • 26.  A concrete example: Erin Andrews is an ESPN sportscaster, who was secretly videotaped through hotel peephole in July 09.  Shortly thereafter, a site video.report-cnn.com hosting the tape appeared. Fake Youtube videos LIVE VIDEO PLAYER BLOCKED Your popup blocker has blocked access to the Video Player. To view your video, please launch the Live Video Player below.
  • 27.  Spear Phishing – a highly targeted phishing attack  Disguised as a legitimate communication  Giltcorp.com is not owned or operated by Gilt Social Engineering
  • 29.  Incident response policy, outlining steps to take if a phishing website resembling Gilt is detected.  Buy similar-sounding domains.  Block these sites at firewall level.  Education. Test your users if they fall for it! Preventing social engineering on the web