Social Engineering is a frequently heard term these days, isn’t it?
THIS ARTICLE from CSO Online provides you with a basic understanding of what it is, how it is in action and why you should be worried for yourself and your company.
The essence of the topic is the following: even if you believe you have put in place a state-of-the-art IT Security infrastructure with all the bells and whistles in place (and with the hefty bill that comes with that), Social Engineering is something you cannot afford to overlook. The human factor is recognized today as the weakest link of the IT Security chain made by technology, processes and people. Don’t train your people to use technologies in an appropriate way and to follow processes and you’re out for a safe defeat in you battle with the cyber-threats (and not only those…). However also a well-trained workforce needs to be aware of the typical social engineering threats which are around. There are not so many types of those, after all, just many variations. So Security Awareness Training programs can do wonders in this field and you should never neglect the inclusion of those in any Security program; the stakes are way too high.
Social engineering attacks can be also perpetrated by non-remote users.
The typical social engineering attack is perpetrated by remote users who, most of the time, have little knowledge about you, your company and the industry you are in. They just try to grab credentials and other types of valuable personal information through email phishing attempts, rogue web sites or forms crafted to look as identical as possible (save in the url address, which will never be identical to the legit one). Those type of attacks are in general very impersonal because the attacker knows little or nothing about you.
One more personal type of attack is perpetrated by phone scammers, who tend to know more about you (they have managed to reach your phone, after all, so they might have conducted some preliminary research). Again, the objective is to trick you to release personal information and possibly access credentials while making you believe that the request is legit. My wife experienced a scam attempt of this type very recently. An anonymous caller identifying himself as “Apple technical support” requested her Apple ID to perform a necessary remote operation to keep her account alive “because we got notified that it got compromised”. The scam did not succeed as my wife easily smelled something rotten there; but how many users are falling for this scam every day?
An even more personal type of social engineering attack, less likely than the other 2 (because more risky for the attacker) is in person. Yes, the person standing in front of you asking for something really personal may be not who he/she is pretending to be. Some of the most complete Penetration tests include attacks of this type because they are not so rare and their result reveal a lot to what extent of training the users had concerning IT Security and Social Engineering in particular. Say two fire inspectors show up at your office, show their badges and ask for a walkthrough—you’re legally required to give them access to do their job. They ask a lot of questions, they take electrical readings at various wall outlets, they examine wiring under desks. Thorough, aren’t they? Problem is, in this case they’re really security consultants doing a social engineering ‘penetration test’ and grabbing access cards, installing keystroke loggers, and generally getting away with as much of your business’s private information as they can get their hands on.
Do you see the threat and all its risk potential? If you still have doubts, read this other article:
How to rob a bank: A social engineering walkthrough
HOW DO THEY DO?
Social engineering attempts are successful with victims who have not been trained for recognition of social engineering patterns of behavior.
This is how social engineers manage to trick people: Four basic principles.
- They project confidence. Instead of sneaking around, they proactively approach people and draw attention to themselves.
- They give you something. Even a small favor creates trust and a perception of indebtedness.
- They use humor. It’s endearing and disarming.
- They make a request and offer a reason. Psych 101 research shows people are likely to respond to any reasoned request.
You can read more in this article: Mind games: How social engineers win your confidence
DEFENSIVE MEASURES:
Awareness is the number one defensive measure. Employees should be aware that social engineering exists and also aware of the tactics most commonly used. And here is the good news: luckily, social engineering awareness lends itself to storytelling. And stories are much easier to understand and much more interesting than explanations of technical flaws. Quizzes and attention-grabbing or humorous posters are also effective reminders about not assuming everyone is always who they say they are.
I AM INTERESTED IN THE TOPIC AND I WANT TO KNOW MORE
Here you go the Ultimate guide to Social Engineering released by CSO Online
social-engineering-ultimate-guide













