The iCloud Hack
CMSC 334 Prof Szajda
1
The iCloud Hack CMSC 334 Prof Szajda 1 Social Engineering Many - - PowerPoint PPT Presentation
The iCloud Hack CMSC 334 Prof Szajda 1 Social Engineering Many of the slide here deal with Social Engineering. Thanks for those slides go to: The late Dr. Yosef Sherif, unknown colleague at UW-Madison, Mathew Sullivan at Iowa State, Tanya
1
2
3
images distributed, and then only to entice folks to buy)
compromised
4
5
6
7
access
8
9
10
11
12
13
force)
can be guessed
14
response with little rate limiting is a serious bug
15
16
pornography
17
18
19
20
21
22
23
¨ The end user is usually the weakest link of a system
¤ People are often lazy, ignorant to security, or simply
¨ Social engineering is a journey into social
¤ Yes I know, that probably doesn’t sound very fun ¤ Well guess what… it is, so deal with it!
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
¨ A number of variables influence the persuasion
¤ The Communicator (Who?) ¤ The Message (What?) ¤ The Audience (Whom?) ¤ The Channel (How?)
¨ For now, let’s focus on “The Communicator”
¨ The Communicator (Who?):
¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness
¨ Credibility: “The Milgram Experiment”
white lab coat
¨ Credibility: “The Milgram Experiment”
¤ The “assistant” will give electric shocks in increasing
¤ The “test subject” is actually an actor and is not really
¨ Credibility: “The Milgram Experiment”
¤ After a few shocks, “test subject” actor begins yelling in
¤ “assistant” members would ask the man in the white coat
n By the time the 450-volt switch is reached, the actor has
¨ So what’s the moral of the story?
¤ Most people will obey the man in the white coat ¤ In social engineering, creating the aura of an authority
¨ The Communicator (Who?):
¤ Credibility ¤ Expertise ¤ Trustworthiness ¤ Attractiveness
Source: http://en.wikipedia.org/wiki/Social_psychology_(psychology)
Source: "Gender pairing bias in trustworthiness" from Journal of Socio-Economics, Volume 38, Issue 5, October 2009, Pages 779-789
¨ I bet you are thinking, “That wouldn’t happen to me, I
¤ Oh really? Don’t be so sure! Social Engineers have a
¤ It’s easy for you to say you wouldn’t be fooled, because
n This bias is called illusory superiority n Causes people to overestimate their positive qualities and
¨ Amazing statistics, for your enjoyment:
¤ In a 2003 information security survey, 90% of office
¤ In another study, 70% of people claimed they would
¤ 34% of respondents volunteered their password when
* Researchers made no attempt to validate the passwords Source: http://news.bbc.co.uk/1/hi/technology/3639679.stm
62
63
64
65
66
67
68
69
70
71
help
pretending to assist the user
72
73
74
75
76
77
78
79
Source: http://ils.unc.edu/~neubanks/inls187/home/fugitive.html
¨ In 1981, at the age of 17, Mitnick and his gang of
¨ In broad daylight on a Saturday, the group talked their
¨ From that room, the gang lifted combination lock codes
Source :http://www.takedown.com/bio/mitnick.html
¨ To ensure continued access, they placed fake names and
¤ Take-home point: hackers always leave a way back in
¨ A manager soon realized the names were fraudulent and
¤ Take-home point: don’t tell your girlfriend about your crime
Source :http://www.takedown.com/bio/mitnick.html
83
84
85
86