Saturday, September 13, 2014

Social Engineering

Why should a potential attacker waste their time investigating, searching for vulnerabilities, and attempting to break into a particular system, when they can just ask for the password? Such is the largest motivation for social engineering, a practice which is often nothing more than glorified deception of a group or individual with the goal of extracting information that would not otherwise be divulged. If properly executed, the victim(s) will likely never even know that they have ever been targeted (at least until it's much too late).

The greatest problem with most humans is that they will help anyone who asks them – it's what society and biology have trained and forced us all to do. As such, most people (especially jaded employees) will usually let almost anyone borrow their laptops or mobile phones in order to let someone “quickly check their email”, or “call a friend because their phone's battery died” - try it sometime. From there, it's fairly trivial to steal sensitive documents by sending them to yourself, grant yourself remote access, or perform a whole host of other attacks. More commonly, it's likely you or someone you know has had their Facebook or Twitter account “hacked” in such a manner.

Have you ever given a second thought about a janitor, cleaning crew, or a garbageman past just acknowledging their existence in your environment? If you have, you can probably predict what I'm going to write about in this paragraph – and if not, you've probably already inferred it given the context of this blog post. Janitors and the cleaning crew usually have near complete, unfettered access to an organization's physical location, and often after-hours. It's hard to realize, but you put your implicit trust into men and women who probably would not mind supplementing their salaries by the simple acts of taking photocopies and sticking flash drives into computers. Even supposing all of the employees you hire are saints who would never act against their employer, it isn't too hard for a social engineer (or anyone for that matter) to fill out a job application for a janitorial position. Fine, let's suppose you don't have any cleaning or janitorial staff - you probably still have someone picking up your trash a few times a week (probably someone not even employed by you). As an example from operations security, it isn't very hard to infer how well a company is doing from the contents of their garbage. Filled with pizza boxes every single day? The company has enough money to provide lunch for all of their employees. Lots of cardboard boxes labeled “Dell” or “HP”? Looks like they just installed a bunch of new machines and are probably looking as to how to get rid of their old ones. Various personal items, family photos, and a potted plant or two? Someone was probably just fired, and is likely disgruntled... they shouldn't be too hard to get information from.

It doesn't even have to be that difficult. In many cases, the social engineer doesn't even have to leave their desk – they can simply call a given organization and impersonate their remote IT provider. If it's a large organization, you can easily go so far as to pretend that you're an individual employed at a satellite office, a contractor, or even just a vendor seeking more information about the corporation's needs. Edward Snowden, a former systems administrator at the NSA, claims he just asked for additional access from superiors and co-workers.

Speaking to the security-conscious software developers at Stevens and around the world, I challenge you to create the most secure piece of software you can – there's nothing lines of code can do to stop a human from leaving a piece of paper attached to their monitor with the password. Thinking second factor authentication? Let's be honest - it's really not too hard to get a hold of someone's phone and computer at the same time.

It seems that the weakest link always comes down to the individual person. It's in this conclusion that social engineering thrives, and unfortunately there's not much that can be done (education and the threat of legal action only go so far).

 

No comments:

Post a Comment