Top Banner
Social Engineering SBA Research & Vienna University of Technology Edgar R. Weippl
52

Social Engineering - nii.ac.jp · ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Jul 30, 2018

Download

Documents

donhu
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Social Engineering

SBA Research & Vienna University of Technology

Edgar R. Weippl

Page 2: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Human Factor

Estimation for Risk Analysis

Social Engineering

Page 3: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Digital Natives

Co

ol h

and

le

Twitter

iPd

ad iP

ho

ne

Mac

Apple Emai

l

Google

To b

uy

stu

ff

Amazon

2: Google [email protected]

1: Backup email unknown

3: Backup: m…[email protected]

4: forgot PW? Support asks for:

Billing address

Last 4 digits of CC

5: Whois: Address

Billing address

6: Add new CC:

Email, CC (fake) Billing address

7: forgot PW? You need:

Email, CC info Billing address

Last 4 digits of other CCs are visible

Last 4 digits of CC

8: Devices iPhone iPad Mac

9: Post nonsense to Twitter

Page 4: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Knowledge Worker

• It demands that we impose the responsibility for their productivity on the individual knowledge workers themselves. Knowledge workers have to manage themselves. They have to have autonomy.

• Continuous innovation has to be part of the work, the task and the responsibility of knowledge workers.

• Knowledge worker productivity requires that the knowledge worker is both seen and treated as an 'asset' rather than a 'cost'. It requires that knowledge workers want to work for the organization in preference to all other opportunities.”

Source: http://www.knowledgeworkerperformance.com/Peter-Drucker-Knowledge-Worker-Productivity.aspx

Page 5: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

• „But in all my experience, I have never been in any accident…of any sort worth speaking about. I have but one vessel in distress in all my years

at sea. I never saw a wreck and never have been wrecked nor was I ever in any predicament

that threatened to end in disaster of any sort.“

Experts

E.J. Smith, 1907, Captain

RMS Titanic

Source: New York Times, April 16, 1912

Page 6: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Experts

• Reliable data is often not available – Example bot nets

How to steal a botnet, Richard Kemmerer https://www.youtube.com/watch?v=2GdqoQJa6r4 Richard A. Kemmerer. 2009. How to steal a botnet and what can happen when you do. In Proceedings of the 11th international conference on Information and Communications Security (ICICS'09), Sihan Qing, Chris J. Mitchell, and Guilin Wang (Eds.). Springer-Verlag, Berlin, Heidelberg, 1-1. DOI=10.1007/978-3-642-11145-7_1 http://dx.doi.org/10.1007/978-3-642-11145-7_1

• Alternate Sources: – Models, Prediction – Estimates, Experience, Guesses

It is not bad to use these methods if one is aware of the

drawbacks

Page 7: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Prediction

• People overestimate their knowledge – „Unknown Unknowns“ (D. Rumsfeld)

• People are bad at evaluating the quality of their knowledge – Example: Anchoring

• People are bad at judging how good their judgment is. – Example: 2% confidence studies

– Effective error rate: 15 - 30%

Page 8: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Social Engineering

• Anatomy of an attack. http://blogs.rsa.com/anatomy-of-an-attack/

• Google hack attack was ultra sophisticated, new details show http://www.wired.com/threatlevel/2010/01/operation-aurora/

• Microsoft hacked: Joins apple, facebook, twitter – InformationWeek http://www.informationweek.com/security/attacks/microsoft-hacked-joins-apple-facebook-tw/240149323

• N. Perlroth. Chinese hackers infiltrate new york times computers. The New York Times, Jan. 2013.

Page 9: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Types of S.E. Attacks

• Physical approaches – Dumpster diving, stealing, …

• Social approaches – Relationships, inside knowledge

• Reverse social engineering – Victim contacts attacker

• Technical approaches – Freely available information, guessing and targeted

attacks.

• Socio-technical approaches – USB sticks, …

Page 10: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

SOCIAL APPROACHES

Page 11: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

https://www.youtube.com/watch?v=vBPG_OBgTWg

(0:39)

Perception

Page 12: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

https://www.youtube.com/watch?v=ubNF9QNEQLA

Perception

Page 13: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

https://www.youtube.com/watch?v=IGQmdoK_ZfY

A well-known video…

Page 14: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Human Factors

On Pseudologia

phantastica [with regard

to] the example of the

character Felix Krull from

the homonymous novel

by Thomas Mann and

cognitively induced

biases in stereotypical

judgment

Page 15: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Emotions and Feelings

• Authority

• Strong Emotion

• Overloading

• Reciprocation

• Deceptive Relationships

• Reverse Social Engineering

Page 16: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

TECHNICAL APPROACHES

Page 17: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...
Page 18: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...
Page 19: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...
Page 20: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

AppInspect: Large-scale Evaluation of Social Networking Apps

• Social networks act as proxies between user and third-party providers

• Personal information is transferred to providers

• App providers themselves rely on third-parties (analytics, advertising products)

• Custom hosting infrastructures

• Approval of apps with authentication dialog

Page 21: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

System Architecture for Data Collection

Page 22: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

System Architecture for Data Collection

Page 23: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Enumeration

• Exhaustive search in June 2012 with character trigrams • 434,687 unique applications in two weeks • Main obstacle: Facebook account rate limits

Page 24: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Most Popular Apps

• 10,624 most popular app, 94.07% of samples’ cumulative application usage

• Language: English (64.72%), 69 different languages

Page 25: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Permissions per Provider

• 4,747 applications belonged to 1,646 distinct providers • 60.24% of all providers requested personal email address

Page 26: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Permissions per Provider

• 4,747 applications belonged to 1,646 distinct providers • 60.24% of all providers requested personal email address

Page 27: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Suspicious Apps

• 40 providers requested more than 10 permissions • 139 web tracking / advertising providers used • Manually verified requested permissions vs. app

functionality • Legitimate uses

– dating and job hunting applications – XBOX application (not available anymore)

• Malpractices – Horoscopo Diario, 2.5 million monthly users

Would only require birthdate, 25 different permissions – Wisdom of the Buddha etc.

Page 28: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Vulnerability

• 55% Apache httpd, nginx (15.63%), Microsoft IIS (9.4%) • 2 hosts source code disclosure vulnerability (CVE-2010-2263) • 8 hosts ProFTPD buffer overflow (CVE-2006-5815, CVE-2010-

4221) • Host with 1.2 million monthly users and sensitive information

Page 29: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Web Bugs

Page 30: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Information Leaks

• 315 apps directly transferred sensitive information (via HTTP parameter)

Page 31: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Information Leaks

• 51 applications leaked unique user identifiers (HTTP Referrer)

• 14 out of these 51 applications also leaked API authorization tokens

Page 32: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Facebook Summary

• Reported our findings to Facebook in November 2012 – Facebook responded within one week – Skype meetings with Facebook – Facebook acknowledged problems and contacted developers – Fixed in May 2013

• Security and privacy implications – Since January 2010 unproxied access to email address – 60% of application developers request email address – Social phishing, context-aware spam – Users trackable with real name

• Hosting – Number of hosts possible vulnerable – FTP/SSH bruteforce – Amazon EC2 community images

Page 33: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Techniques

• Shoulder surfing • Phishing

– Spear phishing

• Google (e.g. intitle:”Live View / – AXIS 210″) • Waterholing • Baiting

– USB stick

• Social Networking Sites – freddi staur – Robin Sage

• IM • Spying, Pretending justified interest • Telephone, Face2face

Page 34: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Is it the users’ fault?

http://www.emarsys.net/u/reg.php?par=sliBLsUjox_194008_111

_2_t_119422470_23396

Hagai Hartman

emarsys eMarketing

Systems AG

[email protected]

Maerzstrasse 1/5 OG 1/5

Wien, 1150, AT

Page 35: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Why do Nigerian Scammers Say They are

from Nigeria? https://research.microsoft.com/pubs/167719/WhyFromNigeria.pdf

Are phishers really stupid?

Page 36: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Lessons learned

• Secure passwords to not solve all problems – Alternate attack vectors

• Phishing, • Social engineering, etc.

• Backup passwords, recovery options are dangerous – Security questions

– Backup email accounts – Support calls

• How can you identify a person? – credit card? – social security number?

– fingerprint?

– Login / password?

Cloud Dienste in mobilen Netzwerken

Christian Platzer

Page 37: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Further reading

Fraud and Abuse: A Survey of Life on the Internet TodayEllen Cram Kowalczyk, Principal Security Program Manager Lead, Microsoft http://channel9.msdn.com/Events/Blue-Hat-Security-Briefings/BlueHat-Security-Briefings-Fall-2012-Sessions/BH1201 Social AuthenticationAlex Rice, Product Security, Facebook http://channel9.msdn.com/Events/Blue-Hat-Security-Briefings/BlueHat-Security-Briefings-Fall-2012-Sessions/BH1202

Page 38: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

• Authority

• Strong Emotion

• Overloading

• Reciprocation

• Deceptive Relationships

• Integrity and Consistency

• Social Proof

Psychological Background

Page 39: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Outline

Information Gathering

Elicitation & Pretexting

APT

Page 40: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Observation & Empirical Research

Observation of complex systems

Page 41: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Empirical Research

• Dropbox Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, and Edgar R. Weippl. Dark clouds on the horizon: Using cloud storage as attack vector and online slack space. USENIX Security, 8/2011.

• WhatsApp Sebastian Schrittwieser, Peter Fruehwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar R. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012), 2 2012.

• Facebook Markus Huber, Sebastian Schrittwieser, Martin Mulazzani, and Edgar Weippl. Appinspect: Large-scale evaluation of social networking apps. In ACM Conference on Online Social Networks (COSN 2013), 2013.

• Amazon Amir Herzberg and Haya Shulman and Johanna Ullrich and Edgar R. Weippl, Cloudoscopy: Services Discovery and Topology Mapping, in Proceedings of the ACM Cloud Computing Security Workshop (CCSW) at ACM CCS 2013, 2013.

Page 42: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...
Page 43: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Attack scenario

Friend

Friend

Phished

friend

Spammed

friend

Spam

Attack

seed

Spammed

friend

Spam

Spammed

friend

Spam

Spammed

friend

Spam

Phishing

Phished

friend

Spammed

friendSpam

Spammed

friend

Spam

Spammed

friend

Spam

Spammed

friend

Spam

Phishing

Friend

Friend

Friend

Friend

Friend

Friend

Friend

Friend

Friend

Friend

Friend

Friend

1st Iteration 2

nd Iteration 3

rd Iteration ...

Page 44: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Fast Access to Data: Collection of digital evidence through our social snapshot application

Page 45: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Access to Data

Page 46: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Anonymized Social Interconnection Graph

Page 47: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Anonymized Social Interaction Graph using Picture Tags

Page 48: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Social interaction graph using direct messages

Page 49: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Example timeline

Page 50: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Putting it all together …

Information Gathering

Elicitation & Pretexting

APT

Page 52: Social Engineering - nii.ac.jp ·  ... (analytics, advertising products ... In Network and Distributed System Security Symposium (NDSS 2012), ...

Hardware Malware