RP Hacking Human Os
RP Hacking Human Os
RP Hacking Human Os
The use of social engineering techniques has become a significant and wide-
spread means of deploying malicious attacks on the Internet to obtain sensitive
or classified information from competitors, rivals, and governments, among others.
A recent trend in the attacks is their targeted nature: Criminals are using sophis-
ticated and tailored techniques to deploy malware, usually by spear-phishing
emails. Another example of such a tactic is whaling, which is aimed at high-profile
individuals or members of certain groups of interest for the criminals. While
some organized groups may specialize in large-scale cyberattacks and scams by
throwing out bait and accepting whichever victims bite, others take advantage of
more sophisticated criminal activities and tailored techniques to deploy malware
inside a closed organization, government, or financial institution. The adver-
saries gather intelligence on their targets to learn about their habits and design
a tailored attack to manipulate the targets and attain their objectives, such as
acquiring sensitive information.
The damaging effect and the financial impact of such human-based attacks have
already been brought to the attention of the private and the public sectors, as
well as other societal members, by the numerous occurrences of such frauds in
recent years. We are witnessing the increased effectiveness of these fraudulent
techniques, due to the fact that people are the weakest link in system security
and that the opportunity cost of such an attack is often smaller than targeting
computers and networks. For example, there is almost no cost for employing
social media, spam, and phishing social engineering techniques. We have recently
seen variants of phishing, such as bogus websites (pharming), SMS (smishing),
and phone or voice over IP (vishing). Moreover, we are observing a growing trend
of less technically knowledgeable criminals employing social engineering tactics
to fraudulently obtain sensitive information, deploy malware, or coerce a victim
into making certain transactions. The Crime-as-a-Service model prevalent in the
underground cybercriminal economy significantly facilitates such scams, as the
attackers can acquire more sophisticated attack tools or purchase harvested
data. Furthermore, due to large-scale company data breaches during 2014,
This report from McAfee Labs examines the main threats associated with human-
based attacks for information gathering, fraud, or compromising a computer.
We hope the report will help you better understand current risks and threats,
and forecast trends in the development of criminal activities.
This report will review the concept of social engineering. We will consider the
techniques used in recent cyberattacks, as well as the levers to influence victims,
communication channels, and suggested controls to reduce the risks. This report
will define the concepts of social engineering and introduce mitigations that go
beyond simply suggesting greater awareness as a panacea.
Twitter@Raj_Samani
Twitter@CGMcFarland
During a social engineering interaction, the victim is not aware that his or her
actions are harmful. The social engineer exploits the target’s innocent instincts,
not any criminal instincts. Attackers employ a variety of methods to trick victims
into divulging useful information or performing an action such as clicking a link.
Social engineering uses subterfuge to get its targets to take an action that,
if they were aware of its real purpose, they would not take. Contrast this with
direct techniques such as bribery or the threat of violence. Direct techniques
of exploitation do not fall within the scope of social engineering.
Over time, the relationship between the target and the social engineer
may change. For example, the target may catch on to the attempt and possibly
seek remuneration, or the social engineer may attempt to use blackmail, thus
moving the interaction from social engineering to traditional criminal behavior.
Email is a common vector for social engineering attacks. The recent McAfee
Labs Threats Report: November 2014 reports that global spam accounts for
approximately two-thirds of global email, as measured by McAfee Labs.
12
10
0
Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3
2012 2013 2014
The preceding example arrives via email, and tries to coerce the victim into
opening the attachment by impersonating a legitimate entity. In this example,
it involves minimal interaction with the victim ( just one email) with direct
communication likely to be terminated after the action is carried out.
An example of farming
The following describes how farming was used in an undercover law enforcement
operation in which an agent for the U.S. Federal Bureau of Investigation (FBI)
became an administrator for the carder site DarkMarket.
Close
3. Play 1. Research (optional)
Aims to extract information and keep Aims to understand enough to build
Und
things going long enough to do so. a successful hook.
Social
Extract
erstand
• Strengthen control of relationship. on person and/or organization.
• Extract information. Life Cycle • Determine best person to approach
at the target.
• Plan how to engage with the target,
to identify their levers.
Set
2. Hook
Aims to set things up for a successful play.
• Engage with the target.
• Spin the story.
• Build a level of intimacy.
• Take control of the interaction.
Phase 1: Research
The objective when researching the target is to identify a potential hook or garner
information that may assist the play phase, such as learning the jargon of the
person or company an attacker is trying to imitate. The social engineer can use
a variety of research sources:
With the advent of the Internet, much research can be carried out remotely,
simply, and at relatively low cost. Sometimes, the social engineer conducting an
opportunistic attack may not research the target at all. For example, researching
an individual may be unnecessary when conducting a broad phishing campaign,
because using a common brand with a generic message can fool enough
recipients to incite action.
Phase 2: Hook
A hook aims to set up a successful play. The attacker engages the target and
provides a pretext for interaction. Social engineers will attempt to use their
influencing skills in the hook phase. Psychologist Robert Cialdini cites six
influencing levers, which aim to leverage the subconscious.5
These influencing levers are used for many purposes—including sales, cons
(trying to extract money from people), and social engineering. Some of the
following examples do not target information but demonstrate the use of the
influencing lever.
In this example, the sense that others are also sent the email may give the
reader the feeling that it will be okay to open the email, and any links, too.
This leverages social validation, as well as an element of authority because
the email address itself gives the illusion it was sent from a friend.
Phase 3: Play
The play aims to carry out the purpose of the attack. It might be to extract
information from the target and keep things going long enough to do so, or
it might be to get the target to click on a link. Ultimately, the attacker may have
a number of plays in mind. We can demonstrate a play being dragged out with
the “Nigerian 419 scam.” The Australian government site Scamwatch explains:
With hunting, the play (which may be extracting information or encouraging the
target to click a link) generally happens in the same interaction as the hook and
exit. Although it will be a single interaction, the phases will be distinct.
Extracting information through farming happens over a longer duration. This may
be over many years, and interaction with the target may be sporadic or regular.
Sporadic interaction makes the pattern harder to spot because the data exfiltra-
tion patterns will be much fainter. Farming is more likely to be defeated through
education, as people can learn that something they have been doing is risky.
35,000,000
30,000,000
25,000,000
20,000,000
15,000,000
10,000,000
5,000,000
0
Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3
2012 2013 2014
The number of new suspect URLs skyrocketed in Q3 of 2014. Some of that growth can be
attributed to a doubling in the number of new short URLs, which often hide malicious websites,
and a sharp increase in phishing URLs.
The types of malicious actors involved in cybercrime, any of whom may leverage
social engineering as an attack vector, vary. The Center for Internet Security15 cites
the following:
The following controls can be used to mitigate the risk of social engineering. These
are divided into three categories: people, process, and technology. These controls
are not exhaustive, and may not be applicable to all organizations.
■■ Provide clear boundaries: All ■■ Bogus call reports: When a ■■ Call recording: Routinely record
staff should be keenly aware of suspicious activity has occurred, incoming telephone calls (while
the policies regarding the release staff should complete a report that following federal and state
of information and have clear details the interaction. This assists wiretapping laws) to assist
escalation paths should a request investigations. investigations.
fall outside of their boundaries. ■■ Informative block pages: When ■■ Bogus lines: Route calls that are
■■ Ongoing education: Implement employees reach a malicious web believed to be suspicious to a
a security awareness program to page, use a block page to inform monitored number.
consistently educate employees them why they cannot proceed. ■■ Email filtering: Remove fraudulent
over time. Use tools such as the This will cause them to reflect on emails containing known and
McAfee Phishing Quiz to highlight their prior action and can help never-before seen malware.
specific tactics commonly used identify sources of attack.
in attacks.
■■ Web filtering: Block access to
■■ Customer notification: When malicious websites and detect
■■ Permission to verify: Provide staff callers are denied information, malware inline with access to
with the confidence to challenge the organization should notify the Internet.
even seemingly innocuous them and verify whether the caller
requests. An example of this is to was entitled to the information.
■■ Strong authentication:
challenge people when attempting Organizations should also consider Although leveraging multifactor
to tailgate into offices. how they communicate with authentication will not eliminate
customers. For example, PayPal the risk of users being socially
■■ Teach the importance of engineered into giving up their
information: Even seemingly includes guidance for users that
helps identify if emails they receive authentication credentials, it will
innocuous information such as make the task more difficult for
telephone numbers (enabling are genuine: “A real email from
us will never ask for your bank would-be attackers.
information) can be used
to stage an attack. account number, debit, or credit
card number etc. Also we’ll never
■■ Create a no-blame culture: ask for your full name, your account
The targets of social engineers password, or the answers to
are victims. Punishing specific your PayPal security questions
employees who have been in an email.”25
deceived will make all staff
less likely to admit to releasing
■■ Escalation route: A clear reporting
information. Once conned, they line for front-line staff to escalate
could come under the control of any doubts they may have about
the social engineer, who can then interacting with potentially
use blackmail. fraudulent messages.
■■ Tiger testing: Routinely test staff
for their susceptibility to social
engineering attacks over the use of
multiple communication channels.
This provides a tool to measure the
effectiveness of training programs.
www.intelsecurity.com
1 http://www.bbc.co.uk/news/technology-28106478
2 http://www.fedex.com/us/security/prevent-fraud/email.html
3 http://www.pcworld.com/article/158005/article.html
4 http://blogs.intel.com/energy/re-assessing-risk-energy-sector/
5 http://en.wikipedia.org/wiki/Robert_Cialdini
6 Mitnick, Kevin D. & Simon, William L . “The Art of Deception” Hungry Mind Inc., 2002
www.commerce.utah.gov/releases/08-12-11_dcp-bogus_phishing.pdf
8 http://mindfulsecurity.com/2009/07/21/catching-a-phish/
10 http://www.aig.com/chartis/internet/uk/eni/AIG-Fraud-alert-A4-3page-v5_tcm2538-516102.pdf
11 http://www.techrepublic.com/blog/user-support/hijacked-address-book-how-did-it-happen-and-what-to-do/
12 http://www.scamwatch.gov.au/content/index.phtml/tag/nigerian419scams
13 http://www.verizonenterprise.com/DBIR/2014/
14 http://www.fbi.gov/scams-safety/e-scams
15 http://msisac.cisecurity.org/resources/toolkit/oct13/documents/cyber_crime.pdf
16 http://www.mcafee.com/uk/resources/white-papers/wp-hacktivism.pdf
17 http://msisac.cisecurity.org/resources/toolkit/oct13/documents/cyber_crime.pdf
18 http://www.bloggernews.net/112243
19 http://news.bbc.co.uk/2/shared/bsp/hi/pdfs/21_07_11_icomotorman.pdf
20 http://venturebeat.com/2013/06/18/why-your-insurance-company-wants-to-be-friends-on-social-media/
21 http://www.christianet.com/debtconsolidation/commercialdebtcollector.htm
22 http://net.educause.edu/ir/library/pdf/eqm0517.pdf
23 http://www.journalofaccountancy.com/Issues/2007/Nov/TheHumanElementTheWeakestLinkInInformationSecurity.htm
24 http://www.scmagazine.com/study-reveals-only-56-percent-of-employees-get-awareness-training/article/342029/
25 https://www.paypal.com/gb/webapps/helpcenter/helphub/article/?solutionId=FAQ2061&m=HTQ
The information in this document is provided only for educational purposes and for the convenience of McAfee
customers. The information contained herein is subject to change without notice, and is provided “as is,” without
guarantee or warranty as to the accuracy or applicability of the information to any specific situation or circumstance.
McAfee. Part of Intel Security. Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or other countries. McAfee and
2821 Mission College Boulevard the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the US and other countries.
Santa Clara, CA 95054 Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions
888 847 8766 herein are provided for information only and subject to change without notice, and are provided without warranty of
www.intelsecurity.com any kind, express or implied. Copyright © 2015 McAfee, Inc. 61636rpt_hacking-human-os_0115_fnl_PAIR