Social Engineering Power
Social Engineering Power
Abstract
Social engineering (SE) or perception management is a way for an attacker to trick a
legitimate computer user into providing useful information that helps the attacker gain
unauthorized access to their computer system (1). It is also used in identity fraud or
theft cases as well as in corporate or industrial espionage. The attacker usually poses
as someone to be trusted so that the victim will feel at ease sharing information. There
are many different ways to carry out an SE attack such as over the phone, forged e-
mail, and even in person. Some examples of SE attacks will be discussed in this paper.
Also to be examined are ways of preventing becoming a victim of such an attack.
Methods
Methods used in SE attacks, because they use human behavior, are limited only by the
attacker's creativity. SE attacks work because human beings have many psychological
characteristics that can be taken advantage of (2). Following are some examples of the
methods used in SE attacks.
On the Phone
An easy way to gain valuable information is over the phone. For example, an attacker
could call a secretary at a company and say that he is a temp worker who is having
some trouble gaining access to the company's system. The secretary might simply
give a password, or even better, may go on and on giving detailed instructions in an
effort to be helpful to the new employee (2).
The phone method was used in one case where hackers called an executive's secretary
and were given the executive's employee number. A second call exploited the
knowledge of the executive's employee number in order to obtain the executive's cost
center number, which was then used to receive overnight courier service delivery of
the company's internal phone directory. The hackers then called the office in charge of
new employees and were able to obtain a list of new employees. Posing as
information systems employees, they then called new employees saying that they
wanted to go over security awareness over the phone. Through these discussions they
obtained information such as type of systems used in the company, employee
computer ID's and passwords. Combined with this information, the hackers called the
company's help desk and got the numbers for the company's modems. In the end, they
gained access to the company's computer system by calling the modems and using the
ID's and passwords (1).
Snail Mail
Source of Image
Big companies spy on each other constantly. So much so that there is actually a
professional association of corporate spies that can be hired - the Society for
Competitive Intelligence Professionals (SCIP) (4). This type of organization supplies
"plausible deniability" to corporations who are spying on other corporations. In the
event that the spying is discovered and criminal charges are brought, the corporation
can deny knowledge of any illegal activity since the "intelligence professional" signs
documents saying that he/she would abide by all ethical rules and if a crime was
committed, the corporation knows nothing about any illegal activity (4).
In the winter of 1997, Barry (a corporate spy for hire) was called upon by SCIP to run
an operation against Kraft Foods on behalf of Schwan's Sales Enterprises. Barry posed
as a reporter for the Wall Street Journal, as an environmentalist and as a graduate
student and was able to collect all the necessary information in just two days.
-Simply walking through a large office dressed in business attire. Most other
employees will think that he is a new employee and he is allowed free reign to snoop
around through cubicles, look at computer screens, etc. Sometimes office workers will
write their usernames and passwords on a post-it note and stick it to their computer
monitor (5).
-In the same office, an attacker could stand in front of a computer and shout out "Hey,
I forgot the password, anyone know it?" Chances are very good that more than one
person will provide the password (5).
Online
The most typical SE attack online is through email. The e-mail is completely false, of
course, but looks as though it came from someone with the Internet Service Provider
(ISP). The e-mail could say something like:
Recently we switched to Windows NT and in the process we lost the folder that
contained your account information. So that we may provide you with uninterrupted
service to the Internet, please send us your account name and password. Thank you
for your time and patience in this matter.
Sincerely,
**ERROR 03 - Restricted Access Denied** - File access not allowed by user. Consult
with Mr. Downs at (310) 555-1414 for file permission information. (2)
The employee then calls Mr. Downs for help on solving the problem. Since "Mr.
Downs" created the problem in the first place, he has no trouble helping the employee
solve it, thus fostering a sense of trust. While he is helping solve the problem, the
attacker can easily obtain vast amounts of information from this employee.
Prevention
It should go without saying that with just a little common sense, most SE attacks can
be avoided. Sensitive information such as social security numbers, credit card
numbers, addresses, etc. should never be given unless you have made the call
yourself. One of the easiest ways for attackers to gain this sort of information is
through posing as telemarketers, and unfortunately, many people fall for this SE
attack. Online, it should be kept in mind that network administrators never need to
know your password and if you are requested to disclose it, it is always an SE attack
(8).
At the office, education is one of the best ways to avoid becoming a victim. A
knowledgeable user of a system can be told to never give out account information
without permission of a supervisor (2) and be taught how to spot a SE attack. The
Computer Emergency Response Team/Coordination Center (CERT/CC) received
several incident reports concerning users receiving requests to take an action that
resulted in the capturing of their password (9). The messages appeared to be from a
site administrator or root, but an individual at a remote site who was trying to gain
access to the local machine via the user's account may have sent them. A message
received looked like this:
OmniCore (9)
The company sent out a memo with actions to be followed if an employee should be
presented with the above message or something like it.
Following are some basic ways suggested to handle situations that may arise in the
office setting:
-If you cannot personally identify a caller who asks for personal information about
you, about your computer system or any other sensitive information, do not give it.
Verify the caller's identity by calling them back at the their proper phone number as
listed in your company's telephone directory (1).
-Passwords are sensitive and should remain unknown to everyone but you. Systems
administrators or maintenance techs that need to work on your computer do not need
your password. They will have their own password that will allow them access to do
their job (1).
-Verify all systems maintenance techs from outside vendors that come on site to
perform repairs or maintenance. A simple phone call can verify this (1).
-Be knowledgeable about common SE attacks and know how to spot them (2).
Computer users need to be aware that any personal information given out can
potentially be used against them, whether it is at home or in the office setting.
Following security guidelines, being knowledgeable about the systems being used and
plain old common sense can usually thwart an SE attack. No matter how "new and
improved" system security may be, if a user unknowingly gives away key pieces of
information, that security is completely useless. According To Albert Einstein “ There
are two things in this universe which have no end , one is universe and other is
Human’s Stupidity”. So technology can help us to secure our side from the outside
threats but cannot from the most dangerous inside ones.
References
(1) "Social Engineering" [Online], Available:
www.smdc.army.mil/SecurityGuide/v1comput/Social.htm