SlideShare a Scribd company logo
NEVER SURRENDER
Reducing social engineering risk
Rob ragAn
@sweepthatleg
Christina Camilleri
@0xkitty
Shower Foo
What if I say I’m not like the others
What if I say I’m not just another one
of your plays
You’re the pretender
What if I say I will
never surrender
Who The…
Let’s get our hands dirty
What is social engineering?
An exploitation of TRUST
Someone who can leverage the trust of their
victim to gain access to sensitive information or
resources or to elicit information about those
resources
We are professional liars.
People are Vulnerable
And WE are lazy
and we want to be helpful
and we WANT to be noticed.
And social engineering is
the path of least resistance.
the biggest issue we face in infosec.
We are the root of all evil, and the
reason for all security issues.
There is no patch for human stupidity.
People – psychology
Computers – Technology
When it comes to security, We are unreliable.
Technical systems are:
reviewed
scanned
penetration tested
But…
How do we measure
vulnerability in people?
We don’t.
We SHAME and Blame.
We make them feel bad for their behavior.
We are Ignorant.
*And we’re not doing anything to effectively change this.
We avoid testing because it makes us
feel vulnerable.
And we don’t like to feel vulnerable.
psychology + Technology =
We fall victim to basic psychological and
physical needs:
Cialdini 6
Authority
Liking
Social Proof
Scarcity
Reciprocity
Commitment and Consistency
Let me Tell you a story.
Let me Show you how.
Information gathering
Developing a relationship
exploitation
execution
What are we doing wrong?
Almost everything.
We watch videos
We do e-learning modules
We tick boxes
We make posters
And generally feel good about ourselves.
No. You’re doing it wrong too.
Tracking.
Frequency.
Conditioning.
Tracking.
Stop tracking clicks
Stop tracking by department
Don’t track failed attempts
track successes
Track successful reported incidents.
The graph should ideally go up
not down. 
Awareness training should feed a
strong SE specific IR plan
Frequency.
Stop shoving awareness training down
people’s throats.
Conditioning.
Stop using negative reinforcement.
Use positive reinforcement.
Let me Tell you another story.
How do we plan to fix this?
A multi-phased cyclical approach: 
SE > PT > IR > PPP > ES >
SE > PT > ...
Rinse, repeat
How do we plan to fix this?
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
5.  Browser plugins
6.  Org wide web proxy
7.  Alert on org relevant [phishing] domains
8.  Customization of authN to mitigate cloning
Strategic Next Steps
1.  Alias for reporting incidents
2.  Implement anti-email spoofing (SPF, DKIM, DMARC)
3.  Disable HTML in SMTP (plaintext emails FTW)
4.  Sandbox the browser and the email client
5.  Browser plugins
6.  Org wide web proxy
7.  Alert on org relevant [phishing] domains
8.  Customization of authN to mitigate cloning
9.  Application whitelisting
10.  Encrypt sensitive data (in transit & at rest)
11.  Enforce a VPN when not on internal network
12.  Perform regular simulated SE for a more prepared IR team
Questions?
Special Thanks
@lady_nerd @CandySaur @lunarca_ @tastic007 @Napordie
Rob ragAn
@sweepthatleg
Christina Camilleri
@0xkitty
BSidesPGH - Never Surrender - Reducing Social Engineering Risk

More Related Content

What's hot

Hacking
HackingHacking
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
William Gregorian
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
Sylvain Martinez
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
LearningwithRayYT
 
CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud Slides
AltinetLtd
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
Cyber Agency
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
Netpluz Asia Pte Ltd
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarRaghunath G
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
Buy Custom Papers
 

What's hot (20)

Hacking
HackingHacking
Hacking
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
PHISHING PROTECTION
PHISHING PROTECTIONPHISHING PROTECTION
PHISHING PROTECTION
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Phishing
PhishingPhishing
Phishing
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
CEO Fraud Slides
CEO Fraud SlidesCEO Fraud Slides
CEO Fraud Slides
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Data breach
Data breachData breach
Data breach
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekarSocial engineering by-rakesh-nagekar
Social engineering by-rakesh-nagekar
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 

Viewers also liked

Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
Rob Ragan
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
nwrecruit
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
masoud khademi
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
Chris Hammond-Thrasher
 
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
Tomohisa Ishikawa, CISSP, CSSLP, CISA, CISM, CFE
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of BingTenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Rob Ragan
 
Beyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importanceBeyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importance
Saumya Vishnoi
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
Rob Ragan
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Rob Ragan
 
Customer Acquisition Through Social Media
Customer Acquisition Through Social MediaCustomer Acquisition Through Social Media
Customer Acquisition Through Social Media
Mariana Rodriguez
 
Babelfish Articles Nov 2011
Babelfish Articles Nov 2011Babelfish Articles Nov 2011
Babelfish Articles Nov 2011
Brian Crotty
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law Firms
Network 1 Consulting
 
Joakim Dahl IT Verksamhet
Joakim Dahl IT VerksamhetJoakim Dahl IT Verksamhet
Joakim Dahl IT Verksamhet
Joakim Dahl
 
Presentación taller de equipo de medición
Presentación taller de equipo de mediciónPresentación taller de equipo de medición
Presentación taller de equipo de medición
HiokiMex
 
Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.
AndrinoJuan
 
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
Fuente de voltaje  12 v,12v-04_ing_ite_pit_eFuente de voltaje  12 v,12v-04_ing_ite_pit_e
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
Amilkar Lafayette Muñoz
 
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet FarmerCloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
Rob Ragan
 

Viewers also liked (20)

Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social engineering for security attacks
Social engineering for security attacksSocial engineering for security attacks
Social engineering for security attacks
 
Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)Hacker tooltalk: Social Engineering Toolkit (SET)
Hacker tooltalk: Social Engineering Toolkit (SET)
 
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
The Social-Engineer Village at DEF CON 24 : Does Cultural Differences Become ...
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of BingTenacious Diggity - Skinny Dippin in a Sea of Bing
Tenacious Diggity - Skinny Dippin in a Sea of Bing
 
Beyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importanceBeyond the Virtual World- Physical security and its importance
Beyond the Virtual World- Physical security and its importance
 
Attack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack FuAttack Chaining: Advanced Maneuvers for Hack Fu
Attack Chaining: Advanced Maneuvers for Hack Fu
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
 
Customer Acquisition Through Social Media
Customer Acquisition Through Social MediaCustomer Acquisition Through Social Media
Customer Acquisition Through Social Media
 
Babelfish Articles Nov 2011
Babelfish Articles Nov 2011Babelfish Articles Nov 2011
Babelfish Articles Nov 2011
 
The Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law FirmsThe Cloud: Background & Best Practices for Small Law Firms
The Cloud: Background & Best Practices for Small Law Firms
 
Joakim Dahl IT Verksamhet
Joakim Dahl IT VerksamhetJoakim Dahl IT Verksamhet
Joakim Dahl IT Verksamhet
 
Tutorial net beans
Tutorial net beansTutorial net beans
Tutorial net beans
 
FESC.PPT
FESC.PPTFESC.PPT
FESC.PPT
 
Presentación taller de equipo de medición
Presentación taller de equipo de mediciónPresentación taller de equipo de medición
Presentación taller de equipo de medición
 
Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.Publicidad diario la nación del 3 de junio de 1978.
Publicidad diario la nación del 3 de junio de 1978.
 
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
Fuente de voltaje  12 v,12v-04_ing_ite_pit_eFuente de voltaje  12 v,12v-04_ing_ite_pit_e
Fuente de voltaje 12 v,12v-04_ing_ite_pit_e
 
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet FarmerCloudBots - Harvesting Crypto Currency Like a Botnet Farmer
CloudBots - Harvesting Crypto Currency Like a Botnet Farmer
 

Similar to BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
centralohioissa
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
Edgevalue
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
Resolver Inc.
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
Rob Fuller
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
Raffael Marty
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
Emerson Exchange
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
Inspiring Women
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
NPowerCR
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
Rea & Associates
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
ThinAir
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
EricaCiko
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
Frode Hommedal
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsPaul W. Taylor
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 

Similar to BSidesPGH - Never Surrender - Reducing Social Engineering Risk (20)

Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Integrated Security, Safety and Surveillance Solution i3S
Integrated Security, Safety and Surveillance Solution  i3SIntegrated Security, Safety and Surveillance Solution  i3S
Integrated Security, Safety and Surveillance Solution i3S
 
Relating Risk to Vulnerability
Relating Risk to Vulnerability Relating Risk to Vulnerability
Relating Risk to Vulnerability
 
Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?Why isn't infosec working? Did you turn it off and back on again?
Why isn't infosec working? Did you turn it off and back on again?
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?Artificial Intelligence – Time Bomb or The Promised Land?
Artificial Intelligence – Time Bomb or The Promised Land?
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pillThe Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
The Cyber Threat Intelligence Matrix: Taking the attacker eviction red pill
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Breach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good GovernmentsBreach: When Bad Things Happen to Good Governments
Breach: When Bad Things Happen to Good Governments
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 

More from Rob Ragan

Nbt hacker fight
Nbt hacker fightNbt hacker fight
Nbt hacker fight
Rob Ragan
 
Expose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach Patterns
Rob Ragan
 
DeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than DeadDeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than Dead
Rob Ragan
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Rob Ragan
 
Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010
Rob Ragan
 
Filter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireFilter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the Wire
Rob Ragan
 
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without Fighting
Rob Ragan
 

More from Rob Ragan (7)

Nbt hacker fight
Nbt hacker fightNbt hacker fight
Nbt hacker fight
 
Expose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach PatternsExpose Yourself Without Insecurity: Cloud Breach Patterns
Expose Yourself Without Insecurity: Cloud Breach Patterns
 
DeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than DeadDeadDropSF - Better Red Than Dead
DeadDropSF - Better Red Than Dead
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010Lord of the Bing - Black Hat USA 2010
Lord of the Bing - Black Hat USA 2010
 
Filter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the WireFilter Evasion: Houdini on the Wire
Filter Evasion: Houdini on the Wire
 
Static Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without FightingStatic Analysis: The Art of Fighting without Fighting
Static Analysis: The Art of Fighting without Fighting
 

Recently uploaded

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 

Recently uploaded (20)

Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 

BSidesPGH - Never Surrender - Reducing Social Engineering Risk

Editor's Notes

  1. Who has performed social engineering assessments? Who has been a victim of social engineering? Are you sure? Who has a concern that their organization may be or may have already been a victim of a successful social engineering attack?
  2. The inspiration for this talk came from a few experiences during social engineering engagements. Also from listening to the Foo Fighters in the shower. Also from the pleasure and opportunity to work with one of the best social engineering talents in the industry. Why don’t most organization want to perform regular SE assessments? Have they given up? NEVER SURRENDER TO THE PRETENDERS
  3. Christina – Aussie. First time in Pittsburgh. Already saw her first large pine cone, first white tailed deer, first lightening bug. DEFCON SE CTF CHAMP! Going for as many rings as the Pittsburgh Steelers  Rob – Pittsburgher. Born and raised here. Lives in ATL now. Started his hobby and now profession in security right here at PA2600 in the Pitt Student Union ~12 years ago. Lots of familiar faces here. Come ask me about my IRC handle and fun times at Summercon 2004.
  4. DO IT!
  5. As always, I’ll start with a definition of Social Engineering. Taken from social-engineer.org, it’s defined as “The act of manipulating people into performing actions or divulging confidential information..” It’s a blend of science, psychology and art and it taps into basic human emotions and looks at why we react the way we do. Social engineers study people. Truly committed social engineers will study a lot about body language, voice control, vocal indicators and group dynamics. It’s also a study of individual personality types that come out through body language and vocal cues.
  6. A more simple definition of Social Engineering would be “an exploitation of TRUST” – someone who can leverage the trust of their victim to gain access to sensitive information or resources or to elicit information about those resources. The use of social engineering is successful because it preys not on technology, but on the inherent weaknesses of the human component. This is done by manipulating the human victim with messages that exploit your trust, pique your interests and desires, and evoke a range of strong human emotions such as fear, anxiety, trust, human interest and reward.
  7. To make this simple – we are professional liars.
  8. And people are vulnerable, lazy, and we want to be helpful and be noticed., making people an especially enticing target. As a really simple example.. we can spend hours, weeks or months trying to brute force our way to a password… when a phone call with the right pretext and right questions can get you the same password or more in a few minutes.
  9. And that’s exactly it. SE is the path of least resistance. So.. utilising techniques such as planning the right pretext (which is creating and using a contrived scenario), exploiting trust, and appealing to someone’s emotions often results in obtaining the same piece of information - it is almost unbelievable what you can achieve by simply asking, looking or posing as someone. And as software vendors get more and more secure and their products get harder to crack, the role of social engineering becomes greater. And so, we need to understand what it is a social engineer will try, how they will try it and what methodology they may use.
  10. But let me tell you why I care. Social engineering is undoubtedly one of the weakest links in the domain of information security, simply because it is beyond technological control and subject to human nature. We can’t necessarily control the way each individual thinks and reacts, which makes it much more challenging aspect of security to handle.
  11. To keep it simple, people are the root of all evil, and we are the reason for all security issues.
  12. And this is because there is NO patch for human stupidity.
  13. When you combine people with technology, you will encounter problems. People are unreliable.
  14. Technical systems are reviewed, scanned and pentested.
  15. But…. How about people? How do we measure vulnerabilities in people?
  16. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  17. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  18. We don’t. At least we don’t do it effectively. We like to make people feel shameful. We like to pass blame. We like to IGNORE the problem while not doing anything to help the situation. I once had a client tell me that they did not want to do a social engineering test simply because they KNEW that they would be vulnerable.
  19. And when you combine people with technology, you get this big blob of mess.
  20. People are unreliable. People fall victim to basic psychological and emotional needs, and people can be manipulated and persuaded.
  21. To break this down, there’s 6 useful frames called the Cialdini 6 when it comes to SE and effectual persuasion, and those are: Authority- we tend to be influenced by authority positions Liking – We’re influenced by those we like Social Proof – We look at others to determine good behaviour Scarcity – Value is tied to availability Reciprocation – We feel like we have an obligation to return what others provide (favours) Commitment and Consistency – We are pressured to remain consistent with prior engagements
  22. With one engagement at my old job, I had posed as an internal employee for a law enforcement agency and after doing some recon and finding out that the target I had chosen was on holidays – I crafted a pretext on the information that I knew… and that was that I had to come back early from my holiday in Hawaii (which I found posted on her Facebook) to urgently finish a report for my manager. And when you create that sense of urgency, they were naturally inclined to help.. And from there I had managed to get ahold of the IT department using the same sense of urgency and praising them for being so helpful. I said – “I really need to finish this report but oh no.. I’ve forgotten my both my domain and email password because I’ve been on holidays – I’m so sorry! – Can you please help me out?” And what was most surprising is that I got exactly what I wanted which were both passwords read to me over the phone with absolutely NO cross checking that I was who I actually said I was – other than me also being the same gender as my target.. And what was amusing is the guy, let’s call him Mike said “I’m not supposed to do this, but….” and gave me both passwords. He had also asked me what I wanted to set it to, and I said “something simple..” and he said “Ok, sure, I’ll set it to ‘Password1’ but put a dollar sign in front just to be a bit more secure” Thank you Mike! But the point of this is.. this works because most people trust others by default and respond well to social rewards. Many people, especially customer service agents, help desk receptionists, and business assistants or secretaries who are trained to assist people and not to question the validity of each request, tend to trust others and are naturally helpful. + Naomi Wolf story/Robin Safe. There’s this inherit trust we put into social media and it’s absolutely terrifying what you can pull out of this.
  23. And so to demonstrate this in a simple attack model, we really just need to gather the right information, develop a relationship with whoever your target is (be it through small talk or a common interest), exploiting that trust and executing your attack.
  24. Enough about the fluffy stuff. What are we doing wrong? Why is this still such a big issue?
  25. Since everyone loves statistics, a rough estimate of almost 50% of enterprises have been victim to SE attacks, even when most IT and security professionals are aware of this risk.. but aren’t doing enough to prevent or defend this risk. And regardless, SE still has a high success rate through simple means like phishing phone calls. But it is also important to point out that due to human factors, “knowing better but not doing better” is one of the key issues that has not been fully addressed, particularly in the IS domain.
  26. The answer to that question is everything. We are doing a lot wrong.
  27. We like to….. But is this really helping?
  28. Stop using negative reinforcement. Rubbing their nose in it like a dog is demeaning and degrading. ​ Use positive reinforcement. If a person at the organization reported an incident, track that, reward them, and make them a good example for others to follow. ​ How do you get folks on the defensive? ​ Make it easy.​ Make it default.​ Make it rewarding. 
  29. An organization comes to us and wants to develop SE defense for their customer support representatives (CSRs). They have 4000 CSRs and some are in the US, some are offshore, some are in-house, some are external third-parties. Currently training and simulated SE scenarios are performed ad hoc. They have had some incidents recently. Attackers are calling in and coercing CSRs into giving them access to PII and/or access to customer accounts. (Risk #1) On top of that, the CSRs are regularly receiving emails that are actually phishing scams. An email that prompts them to reset their email password is a regular occurrence. (Risk #2) Occasionally the CSRs get malware infections on their terminal, the source is not always clear but it causes downtime when we have to re-image their machine (Risk #3)
  30. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223
  31. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223
  32. http://www.darkreading.com/social-engineering-defenses-reducing-the-human-element/a/d-id/1320223