Social Engineering: Threats and Countermeasures
by Stephen O’Boyle - Senior Consultant at Espion - Thursday, 24 January 2008.
Over the years much has been written about how users are the weakest link in security, and there are surely not many people who would disagree. Despite this, companies often under value the importance of educating personnel about the important security issues of the day. It is easy to see what the reasons might be; companies have spent considerable time and money deploying firewalls and other technical controls. This makes sense to IT staff and it is often what people expect IT to spend their time on.

Users, however, are an integral part of the business and often require more Tender-Loving-Care than we give them credit for. No one will dispute that the technical work is required but unless the organisation provides security awareness training to users in an effort to help protect the organisation’s information the risks are high. The purpose of this article is to highlight the dangers of the growing phenomenon of social engineering, and to offer some practical advice for dealing with the same.

In a nutshell, social engineering is a method of gaining access privileges to an organization and its assets by querying personnel over communications medium such as telephone, e-mail, chat, bulletin boards, face-to-face etc. from a fraudulent “privileged” position. The methodology employs a number of techniques to determine the level of 'security awareness' that exists in the organization under review. In fact, reformed computer criminal and security consultant Kevin Mitnick popularized the term social engineering, pointing out that it's much easier to trick someone into giving you his or her password for a system than to spend time hacking in. He claims it to be the single most effective method in his arsenal.

I’ve worked on many projects over the years where we’ve attempted to gain access to a network and the data on it using social engineering techniques. One of the more common tactics used involves calling end-users and impersonating IT staff and other, usually non-existent, companies. The % of username and passwords given away by staff always astonishes me, typically we have a 75% plus success rate. This carries across private and non-private companies, medium to large organizations and works equally well against high-end business managers who are likely to have remote access. When this is combined with scanning for publicly accessible services, it can prove a highly effective way to gain remote access to a system or network. External PPTP VPN and SSL VPNs are prime examples of such services.

But how much work does an attacker have to do to get usernames and passwords from end-users? In my experience, unless a company already has a security awareness program in place, a few hours on the Internet and a few phone calls is all that’s needed. Before making calls an attacker need only spend a couple of hours researching user names, phone numbers and addresses on the Internet. This is followed up with a few initial phone calls to reception to get the names of the IT manager, the number for IT support and maybe even some names of the IT support staff. All this information is ideal for some name-dropping in the phone calls to add an air of authenticity to your call, especially if you are pretending to do an authorised third party audit or pretending to actually be from the IT support team. A few calls to users later and the chances are you will have some usernames and passwords, all without having to worry about technical things like password cracking or any other mathematically challenging work.


Harnessing artificial intelligence to build an army of virtual analysts

PatternEx, a startup that gathered a team of AI researcher from MIT CSAIL as well as security and distributed systems experts, is poised to shake up things in the user and entity behavior analytics market.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Tue, Feb 9th