10 years of running social engineering exercises ▪ Successfully infiltrated banks, information processing centers, corporate law offices, financial institutions, IT service organizations ▪ Worked on hundreds of post-breach cases
divulging confidential information, used for fraudulent purposes. 01 “Send a Phish” : Command to order an impersonated email to target victim with false pretenses. 02 SMiShing : Sending a fake SMS message to a target victim in order to propagate malicious links or files. 03 PILFER : term synonymous with stealing and related to data theft. 04
based attacks to deceive target victims over the phone. 01 Phreaking : Hacking phone networks in order to make spoofed calls from corporate networks. 02 OSINT : Open Source Intelligence gathering on target entity or target individuals 03 Casing : Identifying favorable physical access points that could facilitate illicit access to a building. 04
all previous records (since 2004) ▪ Phishing is the No. 1 vehicle for ransomware & other malware ▪ 60% of smishers ask for you to click a link ▪ FBI says $2.3M to CEO Email Scams ▪ Account takeovers estimated to hit $775M in 2020
that compel them to react, ideally in a controlled manner to cybercriminals ▪ POWER : Usually accompanied with perpetrated identities where cyber-criminals perpetrate ▪ INTIMIDATION : Bullying victim, generally via impersonated identities ▪ WINNING : Presenting the illusion of gaining rewards or monetary compensation ▪ TRUST : Confiding in the personality of an individual based upon affiliations, looks, or personality. ▪ SYMPATHY : Compassion driven decision based upon empathy to criminal story line ▪ Cyber-criminals will OSINT targeted individuals to identify possible emotional responses to social engineering ploys.
▪ Disseminate malware ▪ Techniques ▪ URLs & Attachments carry “payloads” ▪ Leverages emotional techniques ▪ Generic vs Targeted Phishes ▪ English is improving in these emails ▪ Targets ▪ Other industries on the rise in terms of being targeted ▪ Persistence over opportunistic ploys preferred
heist covering 30 countries and nearly a billion dollars in lost funds, nicknamed Carbanak (Feb 2015) ▪ Spear phishing emails sent to employees ▪ It was a pretty standard scheme: an email with a link that looked like it was coming from a colleague contained the malicious code ▪ Infected work stations ▪ Hackers tunneled deeper into the banks’ systems until they controlled employee stations ▪ Hackers made cash transfers, operate ATMs remotely, change account information, and make administrative changes.
phishing but more passive in nature ▪ Leverages the art of enticement ▪ Examples: ▪ Rogue Mobile App ▪ USBs in parking lot ▪ “Claim a Prize” ploys ▪ Malvertising ▪ Plays on human emotions of want & need but in a more casual fashion
Intent is to leverage the informality of cell phones ▪ False sense of security attributed to cell phones ▪ Impact of Smartphone compromise can be the same as computer compromise ▪ Implications of 2FA (factor authentication) if cell phone is compromised
compliment other attack vectors (e.g. – phone, email, SMS) ▪ Persistence within an organization is the ultimate goal ▪ Criminals don’t need to walk away with flash drives of data anymore ▪ Planting bugs far more effect; reduction from getting caught ▪ Criminals will collude with cyber criminals to case a property and ‘plant’ a device ▪ Door shimming ▪ Drone based recon missions ▪ Tailing a target ▪ Diversion based attacks ▪ Tailgating is king ▪ Card skimming ▪ Bio Spoofing ▪ Dumpster Diving ▪ Colluding with the Insider
‘Blue Team’ to see how you defend ▪ Tailored security awareness training ▪ No off the shelf training ▪ Particularly for ‘support groups’ or operations team members ▪ Network Segregation ▪ Reduced permissions in AD/ LDAP ▪ Incident Response Plan & Training ▪ Log Monitoring & Alerting ▪ Physical Cameras & CCTV ▪ Multi-facto authentication for Email ▪ Soft token based technology implementation ▪ Process based whitelisting software (e.g. – Carbonblack, Solidcore, etc.)
after it leaves your house. ▪ Cross cut is best ▪ Wipe old hard drives. ▪ Enable MFA for Phone Based Apps ▪ Use Google Authenticator or Authy ▪ Employ the use of a Password Manager ▪ Use the Password Generator feature of solution. ▪ Validate requests out of band. ▪ Beware of the trifecta social engineering attack (mail, phone, and email) ▪ Validating context is key ▪ Go to websites yourself over clicking on links ▪ If you don’t recognize a number, don’t answer ▪ Blacklist or block numbers ▪ Pay attention to personal trends ▪ Qualify your ‘friend requests’ on social media