hacking the human - kcaga-cgfm.org y hacking the human... · hacking the human social engineering...

23
Hacking the Human Social Engineering Attacks April 14, 2015 CBIZ MHM, LLC – Kansas City

Upload: trinhkiet

Post on 29-Jul-2018

228 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

Hacking the HumanSocial Engineering Attacks

April 14, 2015

CBIZ MHM, LLC – Kansas City

Page 2: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

PresentersKyle Konopasek, CIA, CICAManager – CBIZ MHM, LLC11440 Tomahawk Creek ParkwayLeawood, KS 66211

Direct: (913) 234-1020Email: [email protected]

Cory Kaiser, CPAManager – CBIZ MHM, LLC11440 Tomahawk Creek ParkwayLeawood, KS 66211

Direct: (913) 234-1238Email: [email protected]

Effective May 1, 2015 our new office address will be:

700 West 47th Street, Suite 1100Kansas City, Missouri 64112.

After May 1st, please direct all calls to our new numbers:

Kyle Konopasek Cory Kaiser(816) 945-5512 (816) 945-5628

Page 3: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

1) Understand what social engineering is and the various types of attacks.

2) Learn how to identify a social engineering attack.3) Understand the impact to an organization as a result of

a social engineering attack.4) Learn who is most susceptible to a social engineering

attack.5) Gain insight on how social engineering attacks can be

mitigated.

Learning Objectives

Page 4: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

1) The clever manipulation of the natural human tendency to trust.

2) Manipulating people into willingly doing something rather than by breaking in using technical or brute force means.

3) The act of manipulating a person to take an action that may or may not be in the target’s best interest. ~ Chris Hadnagy

4) The art of intentionally manipulating behavior using specially crafted communication techniques. ~ Gavin Watson

What Is Social Engineering?

Page 5: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

4%

14%

40%

46%

51%

0% 10% 20% 30% 40% 50% 60%

Other

Revenge or personal vendetta

Competitive advantage

Access to proprietary information

Financial gain

Motivations for Social Engineering Attacks

Source: The Risk of Social Engineering on Information Security, Copyright 2011 Dimensional Research

Page 6: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Sensitive Personally Identifiable Information

• System usernames and passwords

• High-value assets

• Trade secrets and proprietary information

Social Engineering Targets

Page 7: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

32%

12%

13%

13%

30%

38%

14%

16%

13%

19%

0% 10% 20% 30% 40%

Less than $10,000

$10,000 - $25,000

$25,000 - $50,000

$50,000 - $100,000

More than $100,000

All companies

More than 5,000employees

Typical Cost Per Social Engineering Incident

Source: The Risk of Social Engineering on Information Security, Copyright 2011 Dimensional Research

Page 8: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

20%

32%

15%

33%

32%

36%

20%

12%

0% 10% 20% 30% 40%

Less than 5 times

5 - 24

25 - 50

More than 50 times

All companies

More than 5,000employees

Frequency of Social Engineering AttacksOver 2-year Period

Source: The Risk of Social Engineering on Information Security, Copyright 2011 Dimensional Research

Page 9: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Dumpster diving– Company directory and phone list with email addresses.– Client sensitive personally identifiable information.– Employee usernames and passwords to company systems.– Company policies, procedures, systems, vendors.– Vertical cut shred in trash bag in dumpster.– Hand torn documents in trash in dumpster.

An Attack In Action – Stories and Examples

Page 10: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Pretexting, Baiting, and Piggy-backing

– Impersonate telecom, janitorial, security personnel, employees.

– Drop a CD or USB thumb drive with a creative label.

– Follow employees through secured doors.

– Develop rapport and level of comfort.

An Attack In Action – Stories and Examples

Page 11: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Email phishing– New paid time off policy and tracking system.– Obtain false website address – Create a mirror image false website.– Use employee directory from dumpster to email false link to website.– Require Windows login to gain access.– Ask employees to update paid time off balances and requests.

• Provide personal incentive to click the link.

An Attack In Action – Stories and Examples

Page 12: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

https://www.principal.com/

https://www.princlpal.com/

Fake Web Address Example

Page 13: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

5%6%12%

21%

56% Vishing

Other

Criminals

Phishing

Lack of EmployeeAwareness

Social Engineering Threats To Organizations

Source: 2014 Poll: Employees Clueless About Social Engineering, InformationWeek-Dark Reading

Page 14: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

60%

44%

38%

33% 32%

23%

New employeesContractorsExecutive assistantsHuman resourcesBusiness leadersIT personnel

Risk of Falling for Social Engineering Attack

Source: The Risk of Social Engineering on Information Security, Copyright 2011 Dimensional Research

Page 15: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

Social engineering attacks cannot be prevented—only mitigated and deterred.

• Policies– Employees are not allowed to divulge information.

– Prevents employees from being socially pressured or tricked.

– Policies MUST be enforced to be effective.

• Training– User awareness—user knows giving out information is bad.

Mitigating A Social Engineering Attack

Page 16: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Password management• Physical security• Network defenses may only temporarily repel attacks.

– Virus protection

– Email attachment scanning

– Firewalls, etc.

– Intrusion detection system and intrusion protection system

– Encrypted data at rest

• Security must be tested and updated periodically.

Mitigating A Social Engineering Attack

Page 17: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Third-party testing– IMPORTANT! This is strictly intended to be a learning tool for the

organization—not a punishment for individual employees.

– Have the third-party attempt to acquire information from employees using social engineering techniques.

• Acquire information from external sources – website, marketing materials, trash and dumpsters in business parking lot.

• Attack strategically targeted areas of the organization.

– May include technical testing of malware and other abnormalities.

Mitigating A Social Engineering Attack

Page 18: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• What a third party tester should not and cannot do.– Illegal examples from a pretexting perspective

• Law enforcement

• Fire

• Paramedics

• Public safety personnel in general

• Military personnel

• Government official

Mitigating A Social Engineering Attack

Page 19: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Who should consider testing?• Information security focused risk assessment

– Identify weaknesses and most valuable information and assets.

• Planning– Scripts are fully documented and approved by management.

• Reporting– Highly detailed describing each step of testing and the results.– Should not “name names”—not intended to implicate individuals.

• Follow-up training and consulting– Assist in policy development and facilitate quarterly training.

Third Party Social Engineering Testing

Page 20: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

Develop Internal ProgramsInformation Security ProgramThe written plan created and implemented by the organization to identify and control risks to information and information systems and to properly dispose of information.

Security Awareness ProgramSecurity awareness reflects an organization’s attitudetoward protecting the physical and intellectual assets of an organization. This attitude guides the approach used to protect those assets.

Page 21: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• No matter how robust an organization’s . . .– Firewalls,

– Intrusion detection systems,

– Anti-virus/malware software,

– Other technological and physical safeguards . . .

• The human is always the weakest link when dealing with security and protecting valuable information.

Weakest Link

Page 22: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

• Good habits drive security culture and there are no technologies that will ever make up for poor security culture.

• Awareness programs, when properly executed, provide knowledge that instills behavior.

• Social engineering testing is an effective method commonly used to assess the condition of the overall security culture.

It is better to fail a test in a controlled environment than to be attacked without knowing how much information will be lost.

Conclusion

Page 23: Hacking the Human - kcaga-cgfm.org Y Hacking the Human... · Hacking the Human Social Engineering Attacks April 14 ... The art of intentionally manipulating behavior ... • Social

QUESTIONS?