IRM 10 SocialEngineering
IRM 10 SocialEngineering
IRM 10 SocialEngineering
TLP:CLEAR
TLP:CLEAR
ABSTRACT
PREPARATION
landline) numbers, address, social security number, job Red phone line should always be
titles, information on clients, organization or IT systems. recorded for evidence collecting
purposes.
▪ Check your legal department to see which actions are allowed and
which reactions they can handle.
IDENTIFICATION
OBJECTIVE: DETECT THE INCIDENT, DETERMINE ITS SCOPE, AND INVOLVE THE
APPROPRIATE PARTIES.
▪ Phone call / someone you don't know calls you/your service, asking for detailed information.
o If the contact works out of the company and requests for information that could be valuable for a
competitor, deny his requests and go to part 3.
o If the contact pretends to be an employee of your company but the phone number is hidden or not
internal, propose that you call back to the declared number in the directory. If the supposedly
attacker agrees, call back to check. If he rejects this option, go to part 3.
The attacker might use several techniques to entice his victim to speak (fear, curiosity,
empathy ...). Do not disclose information in any case.
Listen carefully to his requests and at the end ask for a phone number to call back or an
email address to reply.
Take notes and stay calm, even if the attacker is shouting or threatening, remember he
tries to use human weaknesses.
CONTAINMENT
At this step, you should be pretty sure that you're dealing with a social engineering attack.
CONTAINMENT
▪ E-mail
o Collect as much information as possible on the email address
o Analyze the email headers and try to locate the source
o Search the e-mail address with Internet tools
o Geolocalize the user behind the email address
REMEDIATION
OBJECTIVE: TAKE ACTIONS TO REMOVE THE THREAT AND AVOID FUTURE INCIDENTS.
RECOVERY
Notify the top management of the actions and the decisions taken on the social engineering case.
For more details on authentication and infrastructure recovery, check the Large-scale malware compromise IRMXXX
LESSONS LEARNED
Inform your hierarchy and subsidiaries about the incident, this could help to avoid similar attacks later.
Report
An incident report should be written and made available to all the actors of the incident.
Capitalize
Actions to improve the social engineering handling processes should be defined to capitalize on this
experience, especially awareness.