SOCIAL ENGINEERING - HOW NOT TO BE A VICTIM!
BHUSHAN GUPTA GUPTA CONSULTING, LLC. WWW.BGUPTA.COM
SOCIAL ENGINEERING - HOW NOT TO BE A VICTIM! BHUSHAN GUPTA GUPTA - - PowerPoint PPT Presentation
SOCIAL ENGINEERING - HOW NOT TO BE A VICTIM! BHUSHAN GUPTA GUPTA CONSULTING, LLC. WWW.BGUPTA.COM WHAT IS YOUR PASSWORD? Jimmy Kimmel Live @Gupta Consulting, LLC. www.bgupta.com 2 JIMMY KIMMEL LIVE - OBSERVATIONS Most Common Password
BHUSHAN GUPTA GUPTA CONSULTING, LLC. WWW.BGUPTA.COM
Jimmy Kimmel Live
@Gupta Consulting, LLC. www.bgupta.com 2
Most Common Password – password123
password
Twitter Hack on June 9, 2016 120,000 Users opted for password - 123456 Its fair to assume that these people work somewhere and can be victims of serious social engineering attacks.
@Gupta Consulting, LLC. www.bgupta.com 3
1987 - AT&T 3B2 with UNIX
4
Human Persuasion!!
@Gupta Consulting, LLC. www.bgupta.com 5
Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people in breaking normal security procedures.
(WhatIs.com)
@Gupta Consulting, LLC. www.bgupta.com 6
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
(Wikipedia)
@Gupta Consulting, LLC. www.bgupta.com 7
San Jose, CA (Hong Kong Subsidiary)
BEC – Business Email Compromise
@Gupta Consulting, LLC. www.bgupta.com 8
SOCIAL ENGINEERING - TROJAN HORSE (GREECE & TROY WAR)
@Gupta Consulting, LLC. www.bgupta.com 9
“The biggest threat to the security of a company is not a computer virus, an unpatched hole in a key program or a badly installed firewall. In fact, the biggest threat could be you.”
@Gupta Consulting, LLC. www.bgupta.com 10
@Gupta Consulting, LLC. www.bgupta.com 11
@Gupta Consulting, LLC. www.bgupta.com 12
@Gupta Consulting, LLC. www.bgupta.com 13
WIN-WIN, HELPFUL, LOYALTY, OBEDIENCE!
@Gupta Consulting, LLC. www.bgupta.com 14
@Gupta Consulting, LLC. www.bgupta.com 15
@Gupta Consulting, LLC. www.bgupta.com 16
Physical Vectors
Infected USBs, CD
IT Impersonator trying to fix your system, obtaining a password and convincing you to load a utility (malware) on your system
@Gupta Consulting, LLC. www.bgupta.com 17
Physical Vectors Cont..
@Gupta Consulting, LLC. www.bgupta.com 18
Digital Vectors:
Admiral James Stavridis (NATO Supreme Allied Commander Europe) Facebook Profile
@Gupta Consulting, LLC. www.bgupta.com 19
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. While Phishing, an attacker casts a wider net hoping that someone will be tricked. Source: Wikipedia
@Gupta Consulting, LLC. www.bgupta.com 20
Source: Securitylist.com 5M 25M 15M
@Gupta Consulting, LLC. www.bgupta.com 21
@Gupta Consulting, LLC. www.bgupta.com 22
Types of phishing:
valuable information
@Gupta Consulting, LLC. www.bgupta.com 23
@Gupta Consulting, LLC. www.bgupta.com 24
action
information or take an action (such as transferring money) to benefit the attacker
@Gupta Consulting, LLC. www.bgupta.com 25
@Gupta Consulting, LLC. www.bgupta.com 26
Bank of America Email, 8th Floor-NC1-002-08-25, 101 South Tryon St., Charlotte, NC 28255-0001
@Gupta Consulting, LLC. www.bgupta.com 27
Focused on an individual who has highly valuable information – C Levels For a successful whaling attack
to the finance department
@Gupta Consulting, LLC. www.bgupta.com 28
Not as polished as a legitimate email
@Gupta Consulting, LLC. www.bgupta.com 29
WORM_GAMARUE.WSTQ
@Gupta Consulting, LLC. www.bgupta.com 30
@Gupta Consulting, LLC. www.bgupta.com 31
@Gupta Consulting, LLC. www.bgupta.com 32
“The biggest threat to the security of a company is not a computer virus, an unpatched hole in a key program or a badly installed firewall. In fact, the biggest threat could be you.”
@Gupta Consulting, LLC. www.bgupta.com 33
@Gupta Consulting, LLC. www.bgupta.com 34
YES Start Assess Problem Needs Fixing? End NO Provide Training NO YES
@Gupta Consulting, LLC. www.bgupta.com 35
Assess your vulnerability by simulating controlled experiments:
impersonation as a courier/messenger/friend of an employee Impersonating as an authority
@Gupta Consulting, LLC. www.bgupta.com 36
Considerations
@Gupta Consulting, LLC. www.bgupta.com 37
Build Support
@Gupta Consulting, LLC. www.bgupta.com 38
Characteristics
@Gupta Consulting, LLC. www.bgupta.com 39
Crafting a Phishing Email
@Gupta Consulting, LLC. www.bgupta.com 40
Data collection – time period
Resources – Security operations + QA
@Gupta Consulting, LLC. www.bgupta.com 41
SIMULATE PHISHING EXPERIMENT - ASSESS PROBLEM MAGNITUDE
Metrics:
@Gupta Consulting, LLC. www.bgupta.com 42
SIMULATE PHISHING EXPERIMENT - OUTCOME
Analysis Outcome:
policy?
@Gupta Consulting, LLC. www.bgupta.com 43
@Gupta Consulting, LLC. www.bgupta.com 44
@Gupta Consulting, LLC. www.bgupta.com 45
Identification of email legitimacy:
@Gupta Consulting, LLC. www.bgupta.com 46
@Gupta Consulting, LLC. www.bgupta.com 47
Bank of America Email, 8th Floor-NC1-002-08-25, 101 South Tryon St., Charlotte, NC 28255-0001
@Gupta Consulting, LLC. www.bgupta.com 48
@Gupta Consulting, LLC. www.bgupta.com 49
Importance of not deleting the email
@Gupta Consulting, LLC. www.bgupta.com 50
A phishing email has been identified: Provide Documented process for :
The link has been followed
@Gupta Consulting, LLC. www.bgupta.com 51
@Gupta Consulting, LLC. www.bgupta.com 52
Other vectors:
courier/messenger/friend of an employee
@Gupta Consulting, LLC. www.bgupta.com 53
Industry Tools:
@Gupta Consulting, LLC. www.bgupta.com 54
@Gupta Consulting, LLC. www.bgupta.com 55
@Gupta Consulting, LLC. www.bgupta.com 56
@Gupta Consulting, LLC. www.bgupta.com 57
White Paper from SANS
https://www.sans.org/reading- room/whitepapers/engineering/methods-understanding-reducing- social-engineering-attacks-36972
@Gupta Consulting, LLC. www.bgupta.com 58
59
60
@Gupta Consulting, LLC. www.bgupta.com 61
@Gupta Consulting, LLC. www.bgupta.com 62