Does your team understand the dangers of social engineering?

Last updated by Tom Bui [SSW] 2 months ago.See history

As developers when we think security we commonly become fixated with issues in the code, out of date software versions or incorrectly configured firewalls. However, we miss one glaring vulnerability which there is no patch for: Users.

Social engineering is a technique which mixes art and science to exploit common human behaviours to compromise information systems. The following is a classic example of social engineering performed over the phone.

Video: Live hack and social engineering at DEF_CON by Dave Kennedy and Kevin Mitnick (10 min)

There are numerous examples of social engineering ranging from phone calls, attackers posing as friends on social media, all the way to sophisticated attempts at phishing users with near-perfect clones of popular websites.

social eng
Figure: ‘Do you think the average consumer could spot the phishing site?’ Source: Troy Hunt

The only solution to social engineering is to train properly and prepare users about the dangers presented by and common techniques used by malicious individuals.

With the above in mind, it is important to review regularly the information availed via search engines and standard operating procedures. Furthermore, it can be useful to test the readiness and alertness of staff by performing mock social engineering attacks.

Take the following situation as an example: the CEO is out of town and decides to use an employee’s laptop left in the office on the weekend, the employee in question is messaged via Skype for their domain password. If the employee is aware of the risks, this poses the company then they would not send the requested credentials and follow proper procedure around reporting a suspected incident.

We open source. Powered by GitHub