SlideShare a Scribd company logo
1 of 2
Download to read offline
Preparation Identification Containment
Objective: Establish contacts, define
procedures, and gather information to save
time during an incident.
■■ Raise user awareness and security policies
Never give any personal or corporate information to
an unidentified person. This could include user IDs,
passwords, account information, name, e-mail
address, phone (mobile or landline) numbers,
address, social security number, job titles,
information on clients, organization or IT systems.
The goal of the social engineer is to steal human
resources, corporate secrets or customer/user data.
Report any suspicious event to your manager,
who will forward it to the CISO in order to have
a centralized reporting.
■■ Have a defined process to redirect any “weird”
request to a “red” phone, if needed.
Red phone number must be clearly tagged as
“Social Engineering”. The phone number has to
be easy to identify in the global phone directory
of your company but requests on reverse
number should not be displayed.
Red phone line should always be recorded for
evidence collecting purposes.
■■ Prepare to handle conversation with social
engineers to identify which information could help
tracking the attacker and his goals.
■■ Check your legal department to see which actions
are allowed and which reactions they can handle.
Objective: Detect the incident, determine its
scope, and involve the appropriate parties.
■■ Phone call / someone you don't know calls
you/your service, asking for detailed information.
 If the contact works out of the company and
requests for information that could be valuable for a
competitor, deny his requests and go to part 3.
 If the contact pretends to be an employee of your
company but the phone number is hidden or not
internal, propose that you call back to the declared
number in the directory. If the supposedly attacker
agrees, call back to check. If he rejects this option,
go to part 3.
The attacker might use several techniques to entice his
victim to speak (fear, curiosity, empathy ...). Do not
disclose information in any case.
Listen carefully to his requests and at the end ask for a
phone number to call back or an email address to reply.
Take notes and stay calm, even if the attacker is shouting
or threatening, remember he tries to use human
weaknesses.
If you can go further, the following information will be
precious:
- the name of the correspondent,
- requested information / people
- accent, language skills,
- industry language and organizational knowledge,
- background noises
- time and duration of the call
■■ E-mail / Someone you don't know requests detailed
information.
 If the contact has an “out of the company” e-mail
address and requests information that could be
valuable for a competitor, go to part 3.
 If the contact uses an internal e-mail address but is
asking for weird information, ask him some
explanations and use the company directory to get
his manager's name that you'll place as a copy.
■■ Eventually notify top management to inform them
that an incident has been encountered relating to a
social engineering attack. They might understand
the goals depending on the context.
1 2
Objective: Mitigate the attack’s effects on the
targeted environment.
At this step, you should be pretty sure that you're
dealing with a social engineering attack.
Actions for all employees:
■■ Phone call
 If the attacker urges you to give a phone number,
follow these steps:
 Use the “red phone line” from your
CERT/CSIRT, if existing.
 Give him the number with an invented name.
 Immediately call your CERT/CSIRT team
explaining what happened and the chosen
invented name.
 If the attacker stresses you too much and does not
let you time to find the Red Phone number, ask him
to call you back later, pretending a meeting.
 If the attacker wants to reach someone, follow
these points :
 Place on hold the attacker and call
CERT/CSIRT team and explain what
happened
 Transfer the conversation of the attacker to
CERT/CSIRT team (do not give him the
number)
■■ E-mail
 Forward to your security team all email including
headers (send as attached documents) for
investigation purposes. It might help to track the
attacker.
3User part User part
Recovery
Aftermath
Incident Response Methodology
IRM #10
Social Engineering Incident
How to handle a social engineering incident (phone or e-mail)
___________________________________________________
IRM Author: CERT SG Team
IRM version: 1.2
E-Mail: cert.sg@socgen.com
Web: https://cert.societegenerale.com
Twitter: @CertSG
Abstract
Incident handling steps
Containment
Remediation
Objective: Take actions to remove the threat
and avoid future incidents.
Some possible remediation actions can be tried:
■■ Alert the law enforcement and/or file a complaint,
■■ Discuss the problem in circles of trust to know if the
company is facing this issue alone,
■■ Threaten the attacker with legal actions if he can be
identified
Objective: Restore the system to normal
operations.
Notify the top management of the actions and the
decisions taken on the social engineering case.
Objective: Document the incident’s details,
discuss lessons learned, and adjust plans and
defences.
Inform your hierarchy and subsidiaries about the
incident, this could help to avoid similar attacks
later.
Report
An incident report should be written and made
available to all the actors of the incident.
The following themes should be described:
■■ Initial detection
■■ Actions and timelines
■■ What went right
■■ What went wrong
■■ Incident cost (direct and indirect losses)
Capitalize
Actions to improve the social engineering handling
processes should be defined to capitalize on this
experience, specially awareness.
This Incident Response Methodology is a cheat sheet dedicated
to handlers investigating on a precise security issue.
Who should use IRM sheets?
 Administrators
 Security Operation Center
 CISOs and deputies
 CERTs (Computer Emergency Response Team)
Remember: If you face an incident, follow IRM, take notes
and do not panic. Contact your CERT immediately if
needed.
6 steps are defined to handle security Incidents
 Preparation: get ready to handle the incident
 Identification: detect the incident
 Containment: limit the impact of the incident
 Remediation: remove the threat
 Recovery: recover to a normal stage
 Aftermath: draw up and improve the process
IRM provides detailed information for each step.
This document is public use
5
6
Actions for CERT or incident response team:
■■ Phone call
 Resume the conversation with the attacker and use
one of these techniques:
 Impersonate the identity of the people whom
the attacker is willing to speak
 Slow down and make last the conversation
and entice the attacker to make mistake.
 Explain him that social engineering attack is
forbidden by law, punished by sanctions and
that lawyer team will handle the issue if it
continues
 If the trap phone number has been used, prepare to
“burn it”, create another one and display it in the
directory.
■■ E-mail
 Collect as much information as possible on the
email address:
 Analyze the email headers and try to locate the
source
 Search the e-mail address with Internet tools
 Geolocalize the user behind the email address
■■ Aggregate all social engineering attacks to visualize
the scheme.
3
4

More Related Content

Viewers also liked

Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacementKasper de Waard
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexKasper de Waard
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google SearchKasper de Waard
 
Hex file and regex cheat sheet
Hex file and regex cheat sheetHex file and regex cheat sheet
Hex file and regex cheat sheetMartin Cabrera
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Martin Cabrera
 
Uní Con Puntos 2
Uní Con Puntos 2Uní Con Puntos 2
Uní Con Puntos 2escuelamdp
 
13-06-2007 - Edital de Convocacão
13-06-2007 - Edital de Convocacão13-06-2007 - Edital de Convocacão
13-06-2007 - Edital de ConvocacãoJBS RI
 
Apresentação jbs abril v1
Apresentação  jbs abril v1Apresentação  jbs abril v1
Apresentação jbs abril v1JBS RI
 

Viewers also liked (19)

Irm 4-ddos
Irm 4-ddosIrm 4-ddos
Irm 4-ddos
 
Irm 12-insiderabuse
Irm 12-insiderabuseIrm 12-insiderabuse
Irm 12-insiderabuse
 
Irm 8-blackmail
Irm 8-blackmailIrm 8-blackmail
Irm 8-blackmail
 
Irm 13-phishing
Irm 13-phishingIrm 13-phishing
Irm 13-phishing
 
Irm 6-website-defacement
Irm 6-website-defacementIrm 6-website-defacement
Irm 6-website-defacement
 
Cheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regexCheatsheet: Hex file headers and regex
Cheatsheet: Hex file headers and regex
 
Cheatsheet: Metasploit
Cheatsheet: MetasploitCheatsheet: Metasploit
Cheatsheet: Metasploit
 
Cheatsheet: Google Search
Cheatsheet: Google SearchCheatsheet: Google Search
Cheatsheet: Google Search
 
Netcat cheat sheet_v1
Netcat cheat sheet_v1Netcat cheat sheet_v1
Netcat cheat sheet_v1
 
Hex file and regex cheat sheet
Hex file and regex cheat sheetHex file and regex cheat sheet
Hex file and regex cheat sheet
 
Cheatsheet: Netcat
Cheatsheet: NetcatCheatsheet: Netcat
Cheatsheet: Netcat
 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
 
Google Search Cheat Sheet
Google Search Cheat SheetGoogle Search Cheat Sheet
Google Search Cheat Sheet
 
Netcat cheat sheet
Netcat cheat sheetNetcat cheat sheet
Netcat cheat sheet
 
Nike + Saúde
Nike + SaúdeNike + Saúde
Nike + Saúde
 
Uní Con Puntos 2
Uní Con Puntos 2Uní Con Puntos 2
Uní Con Puntos 2
 
Galeria
GaleriaGaleria
Galeria
 
13-06-2007 - Edital de Convocacão
13-06-2007 - Edital de Convocacão13-06-2007 - Edital de Convocacão
13-06-2007 - Edital de Convocacão
 
Apresentação jbs abril v1
Apresentação  jbs abril v1Apresentação  jbs abril v1
Apresentação jbs abril v1
 

Similar to Irm 10-social engineering

Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"abercius24
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Sarah K Miller
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social EngineeringVarunjeet Singh Rekhi
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Incident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptxIncident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptxssuser2a8bb7
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organimallisonshavon
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfBhekumuzi Xaba
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-bBbAOC
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanR. Curtis Roth
 

Similar to Irm 10-social engineering (20)

Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4Cybersecurity for IAEM Region 4
Cybersecurity for IAEM Region 4
 
Reconnaissance and Social Engineering
Reconnaissance and Social EngineeringReconnaissance and Social Engineering
Reconnaissance and Social Engineering
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Incident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptxIncident_Response_for_Management_Presentation.pptx
Incident_Response_for_Management_Presentation.pptx
 
Article1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organiArticle1DISCUSSION_1Information security within an organi
Article1DISCUSSION_1Information security within an organi
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdfHow to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
How to Safeguard Your Business from Payment Fraud _ Regions Bank.pdf
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Module 3 social engineering-b
Module 3   social engineering-bModule 3   social engineering-b
Module 3 social engineering-b
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Winchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response PlanWinchester Aquarium and Pet Center Incident Response Plan
Winchester Aquarium and Pet Center Incident Response Plan
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 

Recently uploaded

Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 

Recently uploaded (20)

VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 

Irm 10-social engineering

  • 1. Preparation Identification Containment Objective: Establish contacts, define procedures, and gather information to save time during an incident. ■■ Raise user awareness and security policies Never give any personal or corporate information to an unidentified person. This could include user IDs, passwords, account information, name, e-mail address, phone (mobile or landline) numbers, address, social security number, job titles, information on clients, organization or IT systems. The goal of the social engineer is to steal human resources, corporate secrets or customer/user data. Report any suspicious event to your manager, who will forward it to the CISO in order to have a centralized reporting. ■■ Have a defined process to redirect any “weird” request to a “red” phone, if needed. Red phone number must be clearly tagged as “Social Engineering”. The phone number has to be easy to identify in the global phone directory of your company but requests on reverse number should not be displayed. Red phone line should always be recorded for evidence collecting purposes. ■■ Prepare to handle conversation with social engineers to identify which information could help tracking the attacker and his goals. ■■ Check your legal department to see which actions are allowed and which reactions they can handle. Objective: Detect the incident, determine its scope, and involve the appropriate parties. ■■ Phone call / someone you don't know calls you/your service, asking for detailed information.  If the contact works out of the company and requests for information that could be valuable for a competitor, deny his requests and go to part 3.  If the contact pretends to be an employee of your company but the phone number is hidden or not internal, propose that you call back to the declared number in the directory. If the supposedly attacker agrees, call back to check. If he rejects this option, go to part 3. The attacker might use several techniques to entice his victim to speak (fear, curiosity, empathy ...). Do not disclose information in any case. Listen carefully to his requests and at the end ask for a phone number to call back or an email address to reply. Take notes and stay calm, even if the attacker is shouting or threatening, remember he tries to use human weaknesses. If you can go further, the following information will be precious: - the name of the correspondent, - requested information / people - accent, language skills, - industry language and organizational knowledge, - background noises - time and duration of the call ■■ E-mail / Someone you don't know requests detailed information.  If the contact has an “out of the company” e-mail address and requests information that could be valuable for a competitor, go to part 3.  If the contact uses an internal e-mail address but is asking for weird information, ask him some explanations and use the company directory to get his manager's name that you'll place as a copy. ■■ Eventually notify top management to inform them that an incident has been encountered relating to a social engineering attack. They might understand the goals depending on the context. 1 2 Objective: Mitigate the attack’s effects on the targeted environment. At this step, you should be pretty sure that you're dealing with a social engineering attack. Actions for all employees: ■■ Phone call  If the attacker urges you to give a phone number, follow these steps:  Use the “red phone line” from your CERT/CSIRT, if existing.  Give him the number with an invented name.  Immediately call your CERT/CSIRT team explaining what happened and the chosen invented name.  If the attacker stresses you too much and does not let you time to find the Red Phone number, ask him to call you back later, pretending a meeting.  If the attacker wants to reach someone, follow these points :  Place on hold the attacker and call CERT/CSIRT team and explain what happened  Transfer the conversation of the attacker to CERT/CSIRT team (do not give him the number) ■■ E-mail  Forward to your security team all email including headers (send as attached documents) for investigation purposes. It might help to track the attacker. 3User part User part
  • 2. Recovery Aftermath Incident Response Methodology IRM #10 Social Engineering Incident How to handle a social engineering incident (phone or e-mail) ___________________________________________________ IRM Author: CERT SG Team IRM version: 1.2 E-Mail: cert.sg@socgen.com Web: https://cert.societegenerale.com Twitter: @CertSG Abstract Incident handling steps Containment Remediation Objective: Take actions to remove the threat and avoid future incidents. Some possible remediation actions can be tried: ■■ Alert the law enforcement and/or file a complaint, ■■ Discuss the problem in circles of trust to know if the company is facing this issue alone, ■■ Threaten the attacker with legal actions if he can be identified Objective: Restore the system to normal operations. Notify the top management of the actions and the decisions taken on the social engineering case. Objective: Document the incident’s details, discuss lessons learned, and adjust plans and defences. Inform your hierarchy and subsidiaries about the incident, this could help to avoid similar attacks later. Report An incident report should be written and made available to all the actors of the incident. The following themes should be described: ■■ Initial detection ■■ Actions and timelines ■■ What went right ■■ What went wrong ■■ Incident cost (direct and indirect losses) Capitalize Actions to improve the social engineering handling processes should be defined to capitalize on this experience, specially awareness. This Incident Response Methodology is a cheat sheet dedicated to handlers investigating on a precise security issue. Who should use IRM sheets?  Administrators  Security Operation Center  CISOs and deputies  CERTs (Computer Emergency Response Team) Remember: If you face an incident, follow IRM, take notes and do not panic. Contact your CERT immediately if needed. 6 steps are defined to handle security Incidents  Preparation: get ready to handle the incident  Identification: detect the incident  Containment: limit the impact of the incident  Remediation: remove the threat  Recovery: recover to a normal stage  Aftermath: draw up and improve the process IRM provides detailed information for each step. This document is public use 5 6 Actions for CERT or incident response team: ■■ Phone call  Resume the conversation with the attacker and use one of these techniques:  Impersonate the identity of the people whom the attacker is willing to speak  Slow down and make last the conversation and entice the attacker to make mistake.  Explain him that social engineering attack is forbidden by law, punished by sanctions and that lawyer team will handle the issue if it continues  If the trap phone number has been used, prepare to “burn it”, create another one and display it in the directory. ■■ E-mail  Collect as much information as possible on the email address:  Analyze the email headers and try to locate the source  Search the e-mail address with Internet tools  Geolocalize the user behind the email address ■■ Aggregate all social engineering attacks to visualize the scheme. 3 4