Pages

Menu

Monday, March 23, 2020

SOCIAL ENGINEERING


In the context of Information Security, Social Engineering is the psychological manipulation of people into divulging confidential information that may be used for fraudulent purposes. This includes a broad range of malicious activities accomplished through human interactions. It is to use psychological manipulation to trick users into making security mistakes or giving away sensitive information. Social engineering attacks could employ various strategies. A perpetrator first investigates the intended victim to gather necessary background information, such as potential points of entry and weak security protocols, needed to proceed with the attack. Afterward, the attacker moves to gain the victim’s trust and provide stimuli for subsequent actions that break security practices which include revealing sensitive information.

Social Engineering is executed in four major steps.
1.  The attacker prepares the base for the attack by gathering the victim’s background information and identifying the various ways of attacking.
2.   Deceiving the victim to gain the foothold by engaging the target, taking control over interactions etc.
3.    Play with the victim by disrupting business by means of executing the attack.
4.    Closing  interactions ideally without arousing suspicion

How Social Engineering Attack Looks like?

Email from a trusted source
Phishing attacks are a subset of social engineering strategy that imitates a trusted source and concocts a seemingly logical scenario for handing over login credentials or other sensitive personal data. According to Webroot data, financial institutions represent the vast majority of impersonated companies and, according to Verizon's annual Data Breach Investigations Report, social engineering attacks including phishing and pretexting (see below) are responsible for 93% of successful data breaches. This may come up using a compelling story stating that.
· “VERIFY” the personal information by clicking on the malicious link
The link location may look very legitimate with all the right logos, and content (in fact, the criminals may have copied the exact format and content of the legitimate site). Because everything looks legitimate, you trust the email and the phony site and provide whatever information the crook is asking for. These types of phishing scams often include a warning of what will happen if you fail to act soon because criminals know that if they can get you to act before you think, you’re more likely to fall for their phishing attempt.

·         NOTIFICATION stating that “You are a Winner”
This may be any email claims to be in the form of a lottery, or a dead relative to click on their site, etc. In order to give you your ‘reward’ you have to provide information about your bank routing so they know how to send it to you or give your address and phone number so they can send the prize, and you may also be asked to prove who you are often including your social security number. These are the ‘greed phishes’ where even if the story pretext is thin, people want what is offered and fall for it by giving away their information, then having their bank account emptied, and identity is stolen.

·         Urgent notifications asking for help
This email could seem from a friend who has been robbed or beaten in a foreign environment, need you to send money and they will state the procedure to send the money to the particular attacker.

Downloading a Link
Downloading a link which is related to any file, picture, movie embedded with the malicious software. If you download which you are likely to do since you think it is from your friend, you will be infected. Now, the criminal has access to your machine, email account, social network accounts, and contacts, and the attack spreads to everyone you know. And it continues.  You’ll trust the link and click and be infected with malware so the criminal can take over your machine and collect your contact info and deceive them just like you were deceived.

Baiting Scenarios
People who take bait such as schemes which may show up an amazingly great deal on certain sites, auctions or offering on something to download, such as a new movie or music may get infected with malicious software that can generate any number of new exploits against themselves and their contacts, may lose their money without receiving their purchased item, and, if they were foolish enough to pay with a check, may find their bank account empty.

Find the Right Cyber security solutions for social Engineering
·         Delete any personal financial information, and passwords and frequently change the passwords.
·         Beware of any download links or files unless you know the person who sent it personally. Suspicious links downloads lead to mistakes.
·         Research the facts. Be suspicious of any unsolicited messages. If the email looks like it is from a company you use, do your own research. Use a search engine to go to the real company’s site, or a phone directory to find their phone number.
·          Install anti-virus software, firewalls, email filters and keep these up-to-date. Set your operating system to automatically update, and if your smartphone doesn’t automatically update, manually update it whenever you receive a notice to do so.  Use an anti-phishing tool offered by your web browser or a third party to alert you about risks.
·         Avoid Email Hijacking. Hackers, spammers, and social engineers taking over control of people’s email accounts (and other communication accounts) have become rampant. Once they control an email account, they prey on the trust of the person’s contacts. Even when the sender appears to be someone you know if you aren’t expecting an email with a link or attachment check with your friend before opening links or downloading.


Relishiya Tenaransz
Undergraduate of Computer Engineering,
Faculty of Engineering, USJ

No comments:

Post a Comment