|  | 
	
		|  | 
	
		| Social Engineering - The Human Factor | 
	
		| Author:
		Dinesh Shetty | 
	
		|  | 
	
		|  | 
	
		|  | 
	
		
	
			 |  | 
	
		
	
		|  | 
	
		|  | 
	
		|  | 
	
		|  | 
	
	
		
	
			 |  | 
	
	
		|  | 
	
		|  | 
	
		|  | 
	
		
	
		 |  | 
		| Cyber security is an increasingly serious issue for the complete 
			world with intruders attacking large corporate organizations with 
			the motive of getting access to restricted content. 
			CSI Computer 
			Crime and Security Survey report for the year 2010-2011 stated that 
			almost half of the respondents had experienced a security incident, 
			with 45.6% of them reporting that they had been subject of at least 
			one targeted attack. 
 | 
 |  | 
		|  | 
 |  | 
	
		|  | 
	
		| Merely trying to prevent infiltration on a technical level and 
			ignoring the physical-social level, cent percent security can never 
			be achieved. Couple of examples can be the scenes from Hackers which 
			shows Dumpster diving in the target company's trash in order to 
			obtain financial data from printouts and the scene from War Games 
			where Matthew Broderick's character studied his target before 
			attempting to crack the password of the military computer system. 
			'Social Engineering' is a threat that is overlooked in most of the 
			organizations but can easily be exploited as it takes advantage of 
			human psychology rather than the technical barricades that surrounds 
			the complete system. Below is a classic example of this: 
 A 
			person receives an e-mail on his official mailbox saying that his 
			computer has been infected with a virus. The message provides a link 
			and suggests that he downloads and installs the tool from the link 
			to eliminate the virus from his computer. The person in a state of 
			confusion clicks on the link to remove the virus from his computer 
			but unwittingly giving a hacker an easy entrance into his corporate 
			network.
 
 To ensure complete security of an organization from all 
			kinds of internal and external factors, the security consultant must 
			have complete knowledge of the Social Engineering cycle, the 
			techniques that can be used by an attacker and the counter-measures 
			to reduce the likelihood of success of the attack.
 
 In this 
			paper we are going to take you through the various phases so as to 
			understand what is Social Engineering, Social Engineering Lifecycle, 
			the various Techniques used in Social Engineering attack with 
			detailed examples and then finally conclude with the 
			counter-measures to protect against each of the Social Engineering 
			attack techniques.
 | 
	
		|  | 
	
	
		|  | 
	
	
		|  | 
	
	
		
	
	 |  | 
	
		| The term "Social Engineering" can be 
		defined in various ways, relating to both physical and cyber aspects of 
		that activity. Wikipedia defines social engineering as: 
 "...the 
		art of manipulating people into performing actions or divulging 
		confidential information".
 
 Other authors have provided the 
		following definitions:
 
 "An outside hacker's use of psychological 
		tricks on legitimate users of a computer system, in order to obtain 
		information he needs to gain access to the system".
 
 "The practice 
		of deceiving someone, either in person, over the phone, or using a 
		computer, with the express intent of breaching some level of security 
		either personal or professional".
 
 "Social Engineering is a 
		non-technical kind of intrusion relying heavily on human interaction 
		which often involves tricking other people into breaking normal security 
		procedures" the attacker uses social skills and human interaction to 
		obtain information about an organization or their computer systems.
 
 In reality Social Engineering can be any of these definitions 
		depending on the circumstances that surround the attack. Social 
		Engineering is actually a hacker?s manipulation of the natural human 
		tendency to trust so as to get sensitive information needed to gain 
		access to a system. Social Engineering does not require high level of 
		technical expertise but requires the individual to have decent social 
		skills.
 
 Many people, for several decades have used social engineering 
		as a method to research and collect data. These early social engineers 
		would use the gathered information as a form of blackmail against the 
		other organizations. Social engineering has been used to gain 
		unauthorized access into several huge organizations. A hacker who spends 
		several hours trying to break passwords could save a great deal of time 
		by calling up an employee of the organization, posing as a helpdesk or 
		IT employee, and can just asking for it.
 | 
	
	
		|  | 
	
	
		|  | 
	
		|  | 
	
		
	
	 |  | 
	 
		| Every Social Engineering attack is 
		unique, but with a little understanding of the situations encountered, 
		we can draft a rough cycle of all the activities that a Social 
		Engineering project goes through leading to a successful outcome. 
 The below figure shows a general representation of the Social 
		Engineering Life Cycle in four main stages:
 | 
	 
		|  | 
	 
		|  | 
	 |  | 
	 |  | 
	 
		 	
	 |  | 
	 | It is the technique of accumulating 
		information regarding the target(s) and the surrounding environment. 
		Footprinting can reveal the individuals related to the target with whom 
		the attacker has to establish a relationship, so as to improve the 
		chances of a successful attack. 
 The information gathering during 
		the Footprinting phase includes but is not limited to:
 
 | 
	 | 
			List of employee names and phone numbersOrganization ChartDepartment InformationLocation 
		information | 
	 
		| Footprinting generally refers to one of the pre-attack phases; 
		tasks performed prior to doing the actual Social Engineering attack. Some of the tools like Creepy, 
		SET and 
		Maltego make Social Engineering 
		engagements easier.
 
 | 
	 |  | 
	 |  | 
	 
		 	
	 |  | 
	 | Once the possible targets have been listed 
		out, the attacker then moves on to develop a relationship with the 
		target who is usually an employee or someone working in the business so 
		as to develop a good rapport with them. 
 The trust that the social 
		engineer is gaining will later be used to unveil confidential pieces of 
		information that could cause severe harm to the business.
 | 
	 |  | 
	 |  | 
	 
		 	
	 |  | 
	 | In this step, the social engineer manipulates 
		the trust that he has gained in the previous phase so as to extract as 
		much confidential information or get sensitive operations related to the 
		target system performed by the employee himself so as to penetrate into 
		the system with much ease. 
 Once all the required sensitive 
		information has been collected, the social engineer may move on to the 
		next target or move towards exploiting the actual system under 
		consideration.
 | 
	 
		| 
 | 
	 
		|  | 
	 
		 	
	 |  | 
	 | Now, after all the actual information has been 
		extracted, the Social Engineer has to make a clear exit in such a way so 
		as not to divert any kind of unnecessary suspicion to himself. He 
		makes sure to not leave any kind of proof of his visit that could lead a 
		trace-back to his real identity nor link him to the unauthorized entry 
		into the target system in the future.
 
 | 
	 
		|  | 
	 |  | 
	 |  | 
	 
		 	
	 |  | 
	 | Every Social Engineer targets specific 
		behavioral traits in the victim so as to extract maximum information out 
		of him. These behavioral traits include but are not limited to: | 
	 
		| 
			Excitement of VictoryMr. X gets an e-mail 
			stating, "You have won 1 Million Dollars and to claim the winning 
			amount, fill in the attached document and forward it to the email 
			id: XXXX@XXXX.com. Switch off your antivirus as it may block the 
			download due to highly encrypted Digital Signature of the 
			documents". Out of Excitement he switches off his Antivirus and 
			proceeds as ordered and downloads the document and opens it but 
			finds it corrupted. Little does he know that he has just downloaded 
			a malware on his machine which allows the email sender to gain 
			remote access to his machine.
Fear of AuthorityMany people are 
			apprehensive in the presence of someone they perceive as an 
			authority figure, it is not that person they are apprehensive about 
			but most likely the position and power of the person that 
			intimidates them and makes them.
 The attackers take on roles of 
			authority figures such as law enforcement officers or high-ranking 
			company officials to extract sensitive organizational information 
			from the victims.
Desire to be helpfulKeith A. Rhodes, 
			chief technologist at the U.S. General Accounting Office, which has 
			a Congressional mandate to test the network security at 24 different 
			government agencies and departments said in one of his interviews 
			that, "Companies train their people to be helpful, but they rarely 
			train them to be part of the security process. We use the social 
			connection between people, their desire to be helpful."
 People in 
			their desire to be helpful and to solve other peoples queries, give 
			out a lot of information that otherwise should not be disclosed to 
			an outsider as it could give an attacker a chance to get 
			unauthorized access to the target system causing a possible loss.
Fear of LossMr. X gets an e-mail 
			stating, "You have won 1 Million Dollars and to claim the winning 
			amount, deposit $75,000 in Account number: XXXXXX in 10 days from 
			receiving this e-mail, failing to which the winning amount would be 
			declared unclaimed and there would be a nee lucky-draw to decide the 
			next winner". Out of fear that he might lose such a good
 opportunity, he deposits the amount to the account number provided. 
			When his future replies to the e-mail address goes unanswered for 
			the next two months nor does the 1 Million Dollar gets deposited to 
			his account, he understands that he has been scammed.
LazinessAll of us have come across 
			some or the other job that requires us to do only a specified set of 
			activities and not linger around looking for better ways of doing 
			that activity. This causes boredom to the person who performs the 
			same task repeatedly on daily basis and over the time learns 
			"shortcuts" to do the tasks using minimal efforts and still meeting 
			the targets. Such individuals over a period of time become lazy and 
			are susceptible to attackers who target such individuals as they 
			know that they would get the required information with much ease due 
			to the laid back attitude of these individuals towards their work.
EgoMany a times, the attacker makes 
			the person more emotionally sure of himself/herself and thus 
			removing the logical awareness of the security breach that is 
			occurring.
 The result is that, the person being hacked senses no 
			harm in providing whatever it is that the attacker is requesting. 
			The reason that such an attack succeeds is that the attacker is a 
			receptive audience for victims to display how much knowledge they 
			have.
Insufficient knowledgeKnowledge about 
			the target system is one of the key factors that differentiate the 
			attacker from other employees of the organization. Many a times, due 
			to lack of proper training, the employees are themselves not sure if 
			they have complete knowledge about the product and Social Engineers 
			take advantage of such situations by creating a sense of urgency and 
			not allowing the employee much time to think and understanding the 
			fact that they are under attack.
 
 | 
	 |  | 
	 |  | 
	 
		  	
	
	 
		|  | 
	
	 
		| The old-fashioned technical way of breaking 
		into the computer systems by brute-forcing the user logins or ports have 
		now been replaced by sophisticated methods that not only are easier, but 
		yield better and faster results based on human psychology. These attacks 
		can help the attacker get access to any system irrespective of the 
		platform, software or hardware involved. 
 How exactly goes a 
		person to carry out Social Engineering attack? The figure below shows 
		some of the most popular techniques used to perform a Social Engineering 
		attack:
 | 
	
	 
		|  | 
	
	 
		|  | 
	
	 
		|  | 
	
	 
		| 
			Shoulder SurfingShoulder surfing is a 
			security attack where-in, the attacker uses observational 
			techniques, such as looking over someone's shoulder, to get 
			information while they are performing some action that involves 
			explicit usage of sensitive, visible information. This can be 
			performed at a close range as well as at a long range using 
			binoculars or other vision-enhancing devices.
Dumpster DivingMany a times, huge 
			organizations dump items like company phone books, system manuals, 
			organizational charts, company policy manuals, calendars of 
			meetings, events and vacations, printouts of sensitive data or login 
			names and passwords, printouts of source code, disks and tapes, 
			company letterhead and memo forms, and outdated hardware carelessly 
			into the company dumpsters. The attacker can use these items to get 
			a huge amount of information about the company organization and 
			network structure.
 This method of searching through the dumpster, looking for 
			potentially useful information discarded by a company?s employees is 
			known as Dumpster Diving.
Role playingIt is one of the key 
			weapons for a Social Engineer. It involves persuading or gathering 
			information through the use of an online chat session, emails, phone 
			or any other method that your company uses to interact online with 
			the public, pretending to be a helpdesk, employee, technician, 
			helpless or an important user to divulge in confidential 
			information.
Trojan horsesIt is one of the most 
			predominant methods currently used by hackers that involve tricking 
			the victims to download a malicious file to the system, which on 
			execution creates a backdoor in the machine that can be used by the 
			attacker any time in the future and thus having complete access of 
			the victim?s machine.
PhishingIt is the act of creating and 
			using Websites and e-mails designed to look like those of well-known 
			legitimate businesses, financial institutions and government 
			agencies to deceive Internet users into disclosing their personal 
			information and falsely claiming to be an established legitimate 
			enterprise in an attempt to scam the user into surrendering private 
			information that will be used for identity theft.
Surfing Organization Websites & Online forumsHuge amount of information regarding the organization 
			structure, email ids, phone numbers are available openly on the 
			company website and other forums. This information can be used by 
			the attacker to refine his approach and create a plan on whom to 
			target and the method to be used.
Reverse Social EngineeringA reverse 
			social engineering attack is an attack in which an attacker 
			convinces the target that he has a problem or might have a certain 
			problem in the future and that the attacker, is ready to help solve 
			the problem. Reverse social engineering involves three parts:
 
			
			Sabotage: After the attacker gains a simple access to the system, he corrupts the system or gives it an appearance of being corrupted. When the user sees the system in the corrupted state, he starts looking for help so as to solve the problem.
			
			
				Marketing: In order to make sure that the user approaches the attacker with the problem, the attacker advertises himself as the only person who can solve the problem.
			
			
				Support: In this step, he gains the trust of the target and obtains access to sensitive information.
			
			 | 
	
	 
		|  | 
	
	 
		|  | 
	
	 
		  	
	
	 
		|  | 
	
	 
		| There is no effective way to protect against a 
		Social Engineering attack because no matter what controls are 
		implemented, there is always that human factor which influences the 
		behavior of an individual. But, there are certain ways to reduce the 
		likelihood of success of the attack. It is also important for 
		organizations to establish a clear and strong security policy and 
		processes to reduce the threat of social engineering.
 
 The 
		following are some of the steps to ensure protection against Social 
		Engineering attack:
 | 
	
	 
		| 
			Security Awareness TrainingsSecurity 
			Awareness is the simplest solution to prevent Social Engineering 
			attacks. Every person in the organization must be given basic 
			security awareness training on timely basis that he/she should never 
			give out any information without the appropriate authorization and 
			that he/she should report any suspicious behavior.
 Background VerificationThere is many 
			a chance that attacker may join the company as an employee so as to 
			gather insider information about the company. This makes background 
			screening a really important part of company policies to counter 
			Social Engineering attack. It should not only be limited to internal 
			employees but must also be extended to vendors and other contractual 
			workers too before they become the part of the organization or are 
			given access to the organization network.
Physical securityThere should be proper 
			access control mechanism in place to make sure that only authorized 
			people are allowed access to restricted sections of the 
			organization. There should be no tail-tagging.
 Limited data leakageThere should be 
			constant monitoring as to what all information about the 
			organization is floating on the World Wide Web. Any kind of 
			irregularity should be immediately taken care of. This will make 
			passive information gathering difficult for the attacker.
 Mock Social Engineering drillsSpecial 
			Social Engineering activities should be performed on the internal 
			employees of the organization by either the security team or by the 
			vendor so as to keep track of the security awareness levels in the 
			organization.
 Data Classification policyThere 
			should be proper classification of data on the basis of their 
			criticality levels and the access personnel. Data classification 
			assigns a level of sensitivity to company information. Each level of 
			data classification includes different rules for viewing, editing 
			and sharing of the data. It helps to deter social engineering by 
			providing employees a mechanism for understanding what information 
			can be disclosed and what cannot be shared without proper 
			authorization.
 | 
	
	 
		|  | 
	
	 
		| Some of the other controls that should be taken 
		care of, to reduce the success of a Social Engineering attack are listed 
		below: | 
	
	 
		| 
			Install and maintain firewalls, anti-virus, anti-spyware 
			software's, and email filters.Never allow people to tailgate with you.There should be a proper Incident response strategy set 
			for the organization.Usage of corporate ID's on public domain, blogs, 
			discussion forums etc should be restricted.Pay attention to the URL of a web site. Though malicious 
			web sites generally look identical to a legitimate site, but the URL 
			may use a variation in spelling or a different domain.Confidential and critical online details like corporate 
			mail box should not be accessed in public places, cafes, and hotels 
			etc. where Internet security cannot be trusted.Don't send sensitive information over the Internet before 
			checking a web sites security.Don't reveal personal or financial information in email, 
			and do not respond to email solicitations requesting this 
			information.Ensure all physical entry and exit points are secured at 
			all times.Do not provide personal information or information about 
			your organization to anyone unless you are certain of the person's 
			authority to have that information.Use virtual keyboard where applicable.Be very careful what is provided on your company web site. 
			Avoid posting organizational charts or lists of key people wherever 
			possible.Make sure to shred any document that is discarded that may 
			contain sensitive data. | 
	
	 
		|  | 
	
	 
		|  | 
	
		
	 
			
	
	 |  | 
	
	
		| Through this article we can understand that, however secure your 
		application is, it is always vulnerable to one thing "The Human Factor". 
		This human factor is the weakest link in security which can be patched 
		not by one time training but only by an ongoing process of improvement. 
 Many times it's rather the interaction between the data and the 
		person has to be secured rather than the interaction between data and 
		server.
 | 
	
		|  | 
	
		|  | 
	
	
		|  | 
	
	
		
	
			 |  | 
	
		
	
		|  | 
	
		|  | 
	
		|  | 
	
		|  | 
	
		|  | 
	
		|  | 
	
		|  | 
		|  |