30
Social Engineering Hacking the Human Kyle Konopasek, CIA CBIZ MHM, LLC Kansas City

Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Social Engineering

Hacking the Human

Kyle Konopasek, CIA

CBIZ MHM, LLC – Kansas City

Page 2: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Tony Coble, CPA

Managing Director – CBIZ MHM and

Shareholder, MHM

11440 Tomahawk Creek Parkway

Leawood, KS 66211

Direct: (913) 234-1031

Email: [email protected]

Presenters

Kyle Konopasek, CIA, CICA

Manager – CBIZ MHM, LLC

11440 Tomahawk Creek Parkway

Leawood, KS 66211

Direct: (913) 234-1020

Email: [email protected]

Page 3: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

About CBIZ and Mayer Hoffman McCann P.C.

With offices in major cities throughout the United States, CBIZ is one of

the nations leading providers of outsourced business services, including

accounting and tax, internal audit, risk management, and a wide range

of consulting services. CBIZ is strategically associated with Mayer

Hoffman McCann P.C. (MHM). MHM is an independent public

accounting firm with more than 280 shareholders in more than 35

offices. MHM specializes in attest services for mid-market and growing

businesses, with a specialty practice devoted to financial institutions.

Together, CBIZ and Mayer Hoffman McCann P.C. are one of the top

accounting providers in the country.

Page 4: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Learning Objectives

• Understand regulatory compliance issues

• Learn exactly what social engineering is and the various

types used.

• Understand how to identify a social engineering attack.

• Gain insight on methods to deter or mitigate social

engineering risk.

Page 5: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

The Regulatory Scene

• Important security regulations and industry

standards:

– Gramm-Leach Bliley Act (GLBA)

– Fair and Accurate Credit Transactions Act (FACTA)

– Payment Card Industry Data Security Standards (PCI

DSS)

Page 6: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Gramm-Leach-Bliley Act (GLBA)

• Requirements

– Implementing and maintaining a comprehensive

information security program

– Assessing and evaluating threats

– Implementing controls commensurate with associated

risks

– “Pretexting protection”, which includes safeguards

against social engineering attacks

– Oversight of service providers

– Board of Directors involvement and approval

Page 7: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Fair and Accurate Credit Transactions Act (FACTA)

• FACTA is targeted to the growing problem of identity

theft. The red flags rules require:

– Ongoing and comprehensive risk assessments to identify covered

accounts and related threats

– Based on the risk assessment, a comprehensive identity theft

program.

– Formal change of address procedures

– Employee training

– Development of specific policies, procedures and practices to

combat identity theft

– Oversight of third party providers

Page 8: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Payment Card Industry Data Security Standards (PCI

DSS)

• PCI is a standard, not a regulation. One of the

requirements to be PCI compliant:

– Perform external and internal penetration tests at least once a

year and after any significant infra-structure or application

upgrades.

Page 9: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Social Engineering as a tool

• Social engineering is highly encouraged for GLBA, as it

offers steps against pretexting.

• Social engineering serves as an exceptional tools to

counter identity theft.

Page 10: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors
Page 11: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• What is Social Engineering? o Manipulate people into doing something rather than

by breaking in using technical means.

Page 12: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Attacker uses human interaction to obtain or compromise

information.

• Attacker may appear unassuming or respectable.

– Pretend to be a new employee, repair man, utility provider, etc.

– May even offer credentials.

What is social engineering?

Page 13: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• By asking questions, the attacker may piece

enough information together to infiltrate an

organization’s network.

– May attempt to get information from many sources.

What is social engineering?

Page 14: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Quid Pro Quo

– Something for something.

• Phishing

– Fraudulently obtaining private information.

• Baiting

– Real world Trojan horse.

• Pretexting

– Invented scenario.

• Diversion Theft

– Lying and convincing others of a false truth—a con.

Types of social engineering

Page 15: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Something for something

– Call random phone numbers at an organization claiming to be

from technical support.

– Eventually you will reach someone with a legitimate problem.

– Grateful you called them, they will follow your instructions.

– The attacker will “help” the user, but will really have the victim type

commands that will allow the attacker to install malware.

Quid Pro Quo

Page 16: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Fraudulently obtaining private information

– Send an email that looks like it came from a legitimate business.

– Request verification of information and warn of some

consequence if not provided.

– Usually contains a link to a fraudulent web page that looks

legitimate.

• Example: Update login information to new HR portal.

– User gives information to the social engineer/attacker.

Phishing

Page 17: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Spear phishing

– Specific phishing that include your name or demographic info.

• Vishing

– Phone phishing—may be a voice system asking for call back.

Phishing - continued

Page 18: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Real example

– Obtain email address of many employees in target organization

including key individual targets like Controller, Staff Accountant,

Executive Assistant, etc.

– Develop website to “change password” or “setup new account” for

a human resources vacation request system.

• Actual organization website is “Western States Credit Union”

• Link to attacker’s website is “Western States Credlt Union”

– Email website link to obtained email addresses.

Phishing - continued

Page 19: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Real world Trojan horse

– Uses physical media.

– Relies on greed and/or the curiosity of the target/victim.

– Attacker leaves a malware infected CD or USB thumb drive in an

obvious location so that it is easily found.

– Attacker uses an intriguing r curious label to gain interest.

• Example: “Employee Salaries and Bonuses 2014”

– Curious employee uses the media and unknowingly installs

malware.

Baiting

Page 20: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Invented scenario

– Involves prior research and a setup used to establish legitimacy.

• Give information that a user would normally not divulge.

– This technique is used to impersonate and imitate authority.

• Uses prepared answers to a target’s questions.

• Other useful information is gathered for future attacks.

• Example: “VP of Facilities” visiting a branch.

Pretexting

Page 21: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

– Illegal examples from an inside testing perspective

• Law enforcement

• Fire

• Military/government official

Pretexting - continued

Page 22: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Real example – Telecom provider

Pretexting - continued

Page 23: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Real example

– Pose as a major telecom provider.

– Props:

• rented white van with magnetic logo

• logo polo shirts and hats

• business cards

• work order

• ID badge.

– Enter credit union branch and ask to inspect the “roving telecom

adapter” because they have been recalled.

Pretexting - continued

Page 24: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Con

– Persuade deliver person that delivery has been requested

elsewhere.

• When delivery is redirected, attacker persuades delivery driver to

unload near a desired address.

• Example: Attacker parks a “security vehicle” in bank parking lot.

Target attempts to deposit money in night drop or ATM but is told by

attacker that it is out of order. Target then gives money to attacker for

deposit and safekeeping.

Diversion Theft

Page 25: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Scavenging key bits of information from many documents

put out in the trash.

– Literally involves getting in a dumpster during off-peak hours and

looking for information.

– Janitorial crews could be involved. Are they bonded?

• Document shredders are not always the answer

– Vertical cut, cross cut, micro cut, and security cut.

Dumpster diving

Page 26: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• No matter how robust an organization’s:

– Firewalls

– Intrusion detection systems

– Anti-virus/malware software

– Other technological and physical safeguards

• The human is always the weakest link when dealing with

security and protecting valuable information.

• Knowledge is power.

– People sometimes want others to “know what they know” to

demonstrate importance.

Weakest Link?

Page 27: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Training

– User awareness

• User knows that giving out certain information is bad.

• Policies

– Employees are not allowed to divulge information.

– Prevents employees from being socially pressured or tricked.

– Polices MUST be enforced to be effective.

How to prevent social engineering?

Page 28: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Every organization must decide what information is

sensitive and should not be shared.

• Password management

• Physical security

• Network defenses may only repel attacks

– Virus protection

– Email attachment scanning

– Firewalls, etc.

• Security must be tested periodically.

How to prevent social engineering?

Page 29: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

• Third-party testing

– Hire a third-party to attempt to attack targeted areas of the

organization.

– Have the third-party attempt to acquire information from

employees using social engineering techniques.

– Learning tool for the organization—not a punishment for

employees.

How to prevent social engineering?

Page 30: Social Engineering - Social...risks –“Pretexting protection”, which includes safeguards against social engineering attacks –Oversight of service providers –Board of Directors

Questions?