Honeybot Your Man in the Middle for Automated Social Engineering - - PowerPoint PPT Presentation

honeybot
SMART_READER_LITE
LIVE PREVIEW

Honeybot Your Man in the Middle for Automated Social Engineering - - PowerPoint PPT Presentation

Honeybot Your Man in the Middle for Automated Social Engineering Institute Eurecom Tobias Lauinger Davide Balzarotti Veikko Pankakoski Engin Kirda Automated Social Engineering iSecLab Institute Eurecom Spambot sending spam


slide-1
SLIDE 1

Tobias Lauinger Davide Balzarotti Veikko Pankakoski Engin Kirda

Honeybot

Your Man in the Middle for Automated Social Engineering

Institute Eurecom

slide-2
SLIDE 2

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 2

Automated Social Engineering

  • Spambot sending spam

scales well

  • Attack is “easy” to

identify by users

  • Phisher chatting with

victims is “hard” to detect by users

  • Attack does not scale

Click here if you want to see me naked: http://123.123.123.123/ Good morning sir > Good morning We need to verify your details > Why? We do this periodically Could you give me your birth date? > ...

How could attackers improve this?

slide-3
SLIDE 3

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 3

Previous Work

Huber, Kowalski, Nohlberg, Tjoa. Towards automating social engineering using social networking sites. In CSE, 2009.

– Introduced notion of ASE – Chatterbot, identified by users after 3 messages (80%)

  • A pathological chatterbot example (ELIZA):

Eliza Emil Hello, I am Eliza. Hello Eliza, how are you? Would you prefer if I were not ?

slide-4
SLIDE 4

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 4

Honeybot in the Middle

  • Bot initiates conversations with users on chat
  • Bot uses human user to answer messages

Hi there! Barbara (Honeybot) Emil Fritz Hello Barbara! Hello Fritz! Hi, how are you? Hi, how are you? ROFL: http://ww...

slide-5
SLIDE 5

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 5

Does This Work in Practice?

  • Risks for test subjects

– Waste of time – Revealing personal information – Emotional consequences

  • Careful setup to minimise these risks
  • Evaluation on IRC during 74 days

We want to test Honeybot in the wild...

...in an ethical way.

For clarity of presentation, only results of channel Dating 1.

slide-6
SLIDE 6

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 6

Bootstrapping a Conversation

  • Say Hi, wanna chat? to 1st user & forward reply
  • Total success probability 59.5%
  • Total median bootstrapping delay 44s
slide-7
SLIDE 7

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 7

Maintaining a Conversation

  • Forwarding messages, median duration 112s

I'm a gentleman, you know. I'm a lady, you know.

  • Replacing male ↔ female words: duration 317s
slide-8
SLIDE 8

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 8

Attack, Part 1: Links

  • Different contents & occasion of links

Link Type Keyword Random Replacement TOTAL IP Address 50.5% 59.7% 58.3% 54.5% TinyURL 61.3% 64.5% 87.5% 63.5% MySpace 56.4% 71.3% 77.8% 62.8% TOTAL 55.9% 64.8% 76.1% 60.1%

slide-9
SLIDE 9

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 9

Attack, Part 2: Questions

  • btw, what was US president Obama's

first name again? I completely forgot

– 56.1% correct answers (keyword matching)

  • do u know where is the eiffel tower? I

know it's in France but where???

– 47.2% correct answers

slide-10
SLIDE 10

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 10

Countermeasures

  • Technical

– Prevent message forwarding, warning next to links, block links... – Can be circumvented

  • Systematic

– Talk to verified friends only, but: Profile cloning – Trust-based mechanisms – User education, but: Attack difficult to detect

slide-11
SLIDE 11

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 11

Conclusion

  • Towards automating social engineering

– Using human to answer messages – Influence conversation – Automated & human (scalable and difficult to detect)

  • Tested spamming & questioning

– high click rates – good stealth: “you've got a virus, seek help!”

  • Could be used to spy on conversations in

underground economy channels

slide-12
SLIDE 12

iSecLab Institute Eurecom

LEET Workshop 2010-04-27 12

Questions?

xkcd.com