An innovative and comprehensive framework for Social Driven - - PowerPoint PPT Presentation

an innovative and
SMART_READER_LITE
LIVE PREVIEW

An innovative and comprehensive framework for Social Driven - - PowerPoint PPT Presentation

An innovative and comprehensive framework for Social Driven Vulnerability Assessment 20 November 2014 Who are we? Enrico o Frument nto Rober erto Puricelli lli (twitter: enricoff) (twitter: robywankenoby) ICT Security Specialist @


slide-1
SLIDE 1

20 November 2014

An innovative and comprehensive framework for Social Driven Vulnerability Assessment

slide-2
SLIDE 2

2

Who are we?

Rober erto Puricelli lli

(twitter: robywankenoby)

ICT Security Consultant @ CEFRIEL

Main Activities: Social-driven Vulnerability Assessment, Security research, passionate

  • f technology…

Enrico

  • Frument

nto

(twitter: enricoff)

ICT Security Specialist @ CEFRIEL

Main Activities: unconventional security, phreak, tweak, psychohistorian, …

slide-3
SLIDE 3

3

Who is cefriel

RESEARCH INNOVATION MARKET

HIGH LOW

CEFRIEL Academic universities Industrial companies

CEFRIE FRIEL L Unique Value e Pro ropos

  • sition
  • n

Bridging the gap between industries and academia to

BOOST INNOVATION

Who is CEFRIEL?

slide-4
SLIDE 4

What will you get?

What is SE today? How companies react? How vulnerable are? Real numbers

…a lot of phun, but no beers

slide-5
SLIDE 5

5

From geek-driven to business-driven.

What’s cybercrime today?

slide-6
SLIDE 6

6

Selling is selling! What do you need to sell cybercriminals products? Who’s the customer?

What’s cybercrime today?

slide-7
SLIDE 7

7

DOOR

OOR-2-DOOR SELLER LER

== == MODERN

RN CYBERCRIMI RIMINAL AL-SELLE ELLER

What’s cybercrime today?

BO BOTH TH TRIES TO

TO ENTER,

, TWEAKIN

ING THE PERSON AT AT THE DOOR..

..

slide-8
SLIDE 8

8

SO WHAT? T? ANYTHING

HING NEW?? W??

What’s cybersecurity today?

YES S A TOTALL LLY DIFFE FERENT RENT APPROACH, H, USING G THE SAME E TECHN HNIQU IQUES ES OF MARKETIN KETING. G..

VIRAL

AL,

GUERRIL ILLA,

UNCONV NVENTIO NTIONA NAL,

… AND OF

OF COURS RSE SOCIAL IAL ENGI GINEERING NEERING 2.0

slide-9
SLIDE 9

9

SELLERS

What’s cybercrime today?

MARKETING EXPERTS SN INFLUENCERS ADVERTISING

“ADVERTISING”

PSYCHOLOGIST

HCI EXPERTS

SOCIOLOGIST

DEVELOPERS

slide-10
SLIDE 10

10

Our team includes several competences

  • malware expert
  • web designer
  • web developer
  • psychologist
  • expert of HCI interaction
  • marketing expert
  • SN influencer
  • legal advisor

What is the security team?

slide-11
SLIDE 11

SOCIAL ENGINEERING 2.0

slide-12
SLIDE 12

12

The Role of the Human Factor in Hacker Attacks

slide-13
SLIDE 13

13

Malware Ecosystem 2.0 Automatic Social Engineering Attacks (ASE) (ab)use of linked-data Chat-bot (ab)use of psychology, personality profiling systems and cognitive science models Mail attack vector Economic Drivers

Characteristics of SE 2.0

slide-14
SLIDE 14

14

Malware Ecosystem 2.0 SE became an important part of the malware 2.0 and the main infection strategy

slide-15
SLIDE 15

15

Automation of SE attacks through information collection and mining and through the sentiment analysis from Social Networks

Automatic Social Engineering Attacks (ASE)

slide-16
SLIDE 16

16

The public bodies and anyone are moving toward the free circulation of data, to the web 3.0. This is the Linked-Open-Data or web-of-data. (ab)using LOD will facilitate the collection of data to fully contextualize attacks to targets. (ab)use of linked-data

slide-17
SLIDE 17

17

Diffused use of chat-bot, as in ASE attacks to start and maintain conversations with other social networks users and to balance the lack of a real social engineer (mass social engineering attacks) Chat-bot

slide-18
SLIDE 18

18

Professional use of memetics and personality models of the attacked users, especially of models coming from theories of cognitive psychology

(Ab)use of Psychology and Cognitive Science

slide-19
SLIDE 19

19

Massive use of mails - if compared to other attack vectors - since it doesn’t need talented hackers and it can reach lot of victims at a time (i.e. new forms of spam) Mail Attack Vector

slide-20
SLIDE 20

20

SE 2.0 is since the beginning an investment (no ways doing it for phun), all attacks have one common aim: making money. Economic Drivers

slide-21
SLIDE 21

21

Characteristics of SE 2.0

vs

vs

slide-22
SLIDE 22

22

Characteristics of SE 2.0 (ab)use of psychology and models of cognitive science

Professional use of memetics and personality models of the attacked users, especially of models coming from theories of cognitive psychology

(ab)use of Social Networks

Social Networks are fantastic sources of information about victims, tastes, personalities, profiles, etc. The phase of information collection about the target in a crucial step for each attack.

slide-23
SLIDE 23

23

slide-24
SLIDE 24

24

THE case study…

The first example… RSA

You probably know this email

slide-25
SLIDE 25

25

  • More than 7 years
  • Target business

executives

  • Drive-by download

attack

  • Steal data and

collect passwords What’s in common? Social Engineering at the beginning

.. the latest one: Darkhotel attacks

slide-26
SLIDE 26

26

PROBLEM: IT’S NOT ANYMORE SO ADVANCED.

“ADVANCED” ONLY MEANS THAT THE ATTACKERS HAVE A (DEVILISH)BUSINESS PLAN

slide-27
SLIDE 27

27

An APT often begins with a Social Engineering attack

  • Email is the most used attack vector
  • How to build an effective attack?

Advanced Persistent Threat Model

SE attack

slide-28
SLIDE 28

28

Spear phishing is the new evil

  • A contextualized email is more effective
  • How to gather information?

Advanced Persistent Threat Model

Target selection SE attack

slide-29
SLIDE 29

29

Internet and Social Network allow to retrieve lots of information

  • Public information are already available
  • Also “active” attacks
  • What’s the result?

Advanced Persistent Threat Model

OSINT Target selection SE attack

slide-30
SLIDE 30

30

Technological attack can create a backdoor inside the company

  • Known vulnerabilities or zero-day attacks
  • What’s next?

Advanced Persistent Threat Model

OSINT Target selection SE attack Ad-hoc tech attack

slide-31
SLIDE 31

31

Inside the network, lateral movement Difficult to detect slow and punctual attacks

Advanced Persistent Threat Model

OSINT Target selection SE attack Ad-hoc tech attack Attack expansion

slide-32
SLIDE 32

32

Advanced Persistent Threat Model

OSINT Target selection SE attack Data exfiltration

How can we measure that risk?

Ad-hoc tech attack Attack expansion

slide-33
SLIDE 33

OUR FRAMEWORK

slide-34
SLIDE 34

34

Our Framework

OSINT Target selection SE attack Ad-hoc tech attack Attack expansion Data exfiltration

slide-35
SLIDE 35

35

Our Framework

OSINT Target selection SE attack Ad-hoc tech attack Attack expansion Data exfiltration

Passive social information mining Spear phishing attack simulation Technological attack simulation

slide-36
SLIDE 36

36

Our Framework

Setup Passive social information mining Spear phishing attack simulation Technological attack simulation Awareness

Framework

slide-37
SLIDE 37

37

Since the activities is innovative stakeholders need to:

  • share objectives
  • define the boundaries

Stakeholders of the company

Setup IT Security Legal

Prior to start the assessment, it is necessary to provide a startup phase

HR Innovation

slide-38
SLIDE 38

38

People are the target of the assessment

  • A potential attacker has no constraints
  • Direct contact with the target (active)
  • Don’t care about consequences
  • During an assessment need to take care about the users
  • Ethical vs legal perspective

Ethics Legal

Only passive scanning Public sources Anonymous results

slide-39
SLIDE 39

39

The purpose is to find some evidence regarding the feasibility of the social engineering attack Focus on the company, not on the user Even if the source are public, lot of information retrieved… ..and it’s just the tip of the iceberg

Passive information mining

slide-40
SLIDE 40

40

slide-41
SLIDE 41

41

Source1

633 mail

Source2

123 mail

Source3 11 mail

Source5

91 mail Source4

103 mail

emails

  • f employees

possibily attacked

initiatives

related to company or employees

templates

for building effective attack

evidence

related to specific risks

slide-42
SLIDE 42

42

The purpose is to test the user behavior when stimulated with social engineering attack It begins with emails sent to employees Target is a sample of employees We evaluate two different type of risks: 1. The user click on the email

  • Expose to drive by-infection

1. The user also provides the requested credentials

  • Lose of a critical company asset

Spear Phishing Attack Simulation

1 2

slide-43
SLIDE 43

43

An example of email for a SDVA test

Type of phishing: A SDVA Example

slide-44
SLIDE 44

44

An example of the related phishing website

Type of phishing – Example of a website

Refers to the phishing campaign

70% DISCOUNT ACME corpora on established a partnership to propose discount to all the employees

Lots

  • f

discounts Limited me Only for Employees Sign in with your company creden als SIGN IN

SIGN IN

Limited
  • ffers
  • nly
for ACME corpora on employees. Click
  • n
the link below an sign
  • in
with your company creden al to
  • btain
the discounts
  • T

ra on established a partnership to count to all the employees

nts

  • yees

ur company creden als SIGN IN

SIGN IN

  • ACME
corpora on employees. Click
  • n
the link below and pany creden al to
  • btain
the discounts
  • 70%
DISCOUNT

Company asset requested (credential)

Both email and website contains clues that allow to identify the risk

slide-45
SLIDE 45

45

The assessment track user behaviors

  • Anonymity vs result analysis

Collected information

Sample data Visit website Insert credentials Report

slide-46
SLIDE 46

46

46

MOST PART OF WORKSTATION ANALYZED INCLUDE OBSOLETE OR UNPATCHED SOFTWARE PEOPLE OFTEN HAVE POTENTIALLY

DANGEROUS BEHAVIORS

slide-47
SLIDE 47

47

The aim is to demonstrate the possibility to compromise the company laptop, knowing its configuration Usually through a proof-of-Concept

  • Analyze software configuration
  • Correlate with vulnerabilities
  • Create a custom exploit payload

Technological attack simulation

slide-48
SLIDE 48

48

48

IT’S POSSIBLE TO FIND A WAY TO

COMPROMISE A WORKSTATION INSIDE THE COMPANY

slide-49
SLIDE 49

49

The assessment should help to raise awareness inside the company against these threats

People is the weak point

  • Management need to be aware
  • Employees need to know

Training and awareness is the only (nowadays) effective countermeasure

..but need to be properly done.

Awareness

slide-50
SLIDE 50

50

Video

Raise awareness through visual information

Pills

describe correct behaviour

Gamification

Stimulate users to enhance learning

slide-51
SLIDE 51

RESULTS

slide-52
SLIDE 52

52

In the last five years we performed about 15 SDVA in big enterprises with thousands of employees, involving about 12000 users

Our experience

70% DISCOUNT ACME corpora on established a partnership to propose discount to all the employees

Lots

  • f

discounts Limited me Only for Employees Sign in with your company creden als SIGN IN

SIGN IN

Food Fashion Technology Travels Limited
  • ffers
  • nly
for ACME corpora on employees. Click
  • n
the link below and sign
  • in
with your company creden al to
  • btain
the discounts
  • Given an example of a

possibile test email

In your

  • pinion, what

are the results

?

slide-53
SLIDE 53

53

Overall results

34%

visit the website

21%

also insert the credentials Employees receive the email

slide-54
SLIDE 54

54

Benchmarking

Click on email link

(% of sample)

Credential insertion

(% of sample)

slide-55
SLIDE 55

55

0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 0% 10% 20% 30% 40% 50% 60% 70%

Benchmarking

Click on email link

(% of sample)

Credential insertion

(% of sample)

3 emails

to obtain one click

5 emails

to obtain a valid credential

58%

conversion rate

click/insertion

34% 21%

slide-56
SLIDE 56

56

40% 30% 20% 10% 0%

Comparison with other studies

Success ratio

(% of overall success)

2%

Average click rate in Marketing

10%

Average click rate in modern phishing

0,01% Average success in “traditional” phishing 34%

Average click rate in our research

Source: www.proofpoint.com

slide-57
SLIDE 57

57

We measure relative effectiveness per campaign

Time analysis - Visits

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 20 40 60 80 100 120

Time

(minutes)

Success ratio

(% of overall success)

41%

success in

10 minutes

50%

success in

20 minutes

High effectiveness

in the first minutes

10 min

41%

20 min

50%

slide-58
SLIDE 58

58

User reactions

I inserted the credential, but I don’t receive a confirm

“ “

I inserted the credential, but I think it’s phishing and I change the password

“ “

This is definitely phishing. Please do something!

“ “

The GOOD The GUILTY The FOOL

slide-59
SLIDE 59

59

User reactions

This is definitely phishing. Please do something!

“ “

6 minutes

fastest email to antiphishing

20 minutes

record on block website

1% of employess

signal the phishing

The GOOD

slide-60
SLIDE 60

60

We measure relative effectiveness per campaign

Time analysis - Visits

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 10 20 30 40

Time

(minutes)

Success ratio

(% of overall success)

32%

Success before first report email Already 50% success before block website

6 min 20 min

slide-61
SLIDE 61

61

User characterization

23% 20% 18% Employee Middle-level Management 26% 22% 19% 17% <30 years 30-40 years 40-50 years >50 years 19% 24% Awareness No Awareness

Age

Younger employees are more exposed

Habits of new generation?

Also managers are vulnerable

Risk is (not enough) lower

Role

Targeted training mitigate the risk

Behaviour is impacted by awareness

Awareness

slide-62
SLIDE 62

CONCLUSIONS

slide-63
SLIDE 63

63

63

PEOPLE

LE DON’T KNOW THAT SHAR

ARING NG INF NFOR ORMA MATIO TION N ON

ON SOCIAL MEDIA CAN BE BE DANGERO ROUS US…

slide-64
SLIDE 64

64

A SOCIAL ENGINEERING

ATTACK WITH A CONTEXTUALIZED HOOK CAN BE EFFECTIVE

COMPAN

ANIES IES ARE EXPOSED ED TO TO SOCI

CIAL AL-DR DRIV IVEN EN RISKS AND

OFTEN EN THERE RE IS IS NO PERCEP

EPTION ION OF

OF HOW EXTENDED ED THE RISK IS IS

slide-65
SLIDE 65

65

LOTS OF EMPLOYEES COULD BECOME A RISK FOR THE ENTERPRISE

JUST FOR A DISCOUNT ON A SANDWICH .. OR A SLICE OF CAKE

slide-66
SLIDE 66

66

PERFORM

RMIN ING APT ATTACKS IS IS BECOMIN ING EXTREM EMEL ELY SIMPLE LE,

, IT

IT MAINLY MEANS HAVING NG A BUSINES NESS (DEVILI ILISH)

) PLAN.. ..

PS: no chick was harmed during the preparation of these slides.

slide-67
SLIDE 67

67

THAT’S ALL FOLKS …