Top Banner
The Bad, Better, and Best Social Engineering Incident Response Rob Ragan @sweepthatleg | Alex DeFreese @lunarca_
73

Social Engineering: the Bad, Better, and Best Incident Response Plans

Apr 21, 2017

Download

Technology

Rob Ragan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Engineering: the Bad, Better, and Best Incident Response Plans

The Bad, Better, and BestSocial Engineering Incident Response

Rob Ragan@sweepthatleg | Alex DeFreese

@lunarca_

Page 2: Social Engineering: the Bad, Better, and Best Incident Response Plans

We are Rob and AlexSecurity consultants at Bishop Fox.

We help organizations secure their networks, applications, and people.

Hello!

Page 3: Social Engineering: the Bad, Better, and Best Incident Response Plans

What are we talking about here?1

Page 4: Social Engineering: the Bad, Better, and Best Incident Response Plans

What are we talking about here?1This talk explores the challenges of responding to social engineering incidents and improving defense.

Page 5: Social Engineering: the Bad, Better, and Best Incident Response Plans

What are we talking about here?1This talk explores the challenges of responding to social engineering incidents and improving defense.

Does your organization have a social engineering-specific response plan?

Page 6: Social Engineering: the Bad, Better, and Best Incident Response Plans

BadThe worst incident responses

Page 7: Social Engineering: the Bad, Better, and Best Incident Response Plans

Phone Social Engineering

Page 8: Social Engineering: the Bad, Better, and Best Incident Response Plans

International News Agency• Impersonate an employee• Call helpdesk for password reset• Gain access to internal network and resources

Page 9: Social Engineering: the Bad, Better, and Best Incident Response Plans

Racorn/Shutterstock

Page 10: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 11: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 12: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 13: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 14: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 15: Social Engineering: the Bad, Better, and Best Incident Response Plans

REQUIREVerb

◉ Need for a particular purpose◉ Cause to be necessary

Page 16: Social Engineering: the Bad, Better, and Best Incident Response Plans

Email Phishing

Page 17: Social Engineering: the Bad, Better, and Best Incident Response Plans

National Retail Company• Impersonate the head of Human Resources• Convince employees to log in to fake benefits portal• Gain access to internal network and resources

Page 18: Social Engineering: the Bad, Better, and Best Incident Response Plans
Page 19: Social Engineering: the Bad, Better, and Best Incident Response Plans

Incident Response Failures• Employees did not know who to report to• IR team did not know who was affected• No enforcement of IR policy• Allowed for persistent access to the internal network

Page 20: Social Engineering: the Bad, Better, and Best Incident Response Plans

Incident Response Failures• Employees did not know who to report to• IR team did not know who was affected• No enforcement of IR policy

• Allowed for persistent access to the internal network

Page 21: Social Engineering: the Bad, Better, and Best Incident Response Plans

Incident Response Failures• Employees did not know who to report to• IR team did not know who was affected• No enforcement of IR policy

• Allowed for persistent access to the internal network

Page 22: Social Engineering: the Bad, Better, and Best Incident Response Plans

Quick Wins

Page 23: Social Engineering: the Bad, Better, and Best Incident Response Plans

Physical Access

Page 24: Social Engineering: the Bad, Better, and Best Incident Response Plans

National Banking Institution• Impersonate IT contractors• Gain access to network ports• Plug in rogue device and gain access to internal network

Page 25: Social Engineering: the Bad, Better, and Best Incident Response Plans

◉Picture of the mailslot◉Picture of pwnplug

Page 26: Social Engineering: the Bad, Better, and Best Incident Response Plans

◉Picture of the mailslot◉Picture of pwnplug

Page 27: Social Engineering: the Bad, Better, and Best Incident Response Plans

◉Picture of the mailslot◉Picture of pwnplug

Page 28: Social Engineering: the Bad, Better, and Best Incident Response Plans

Quick Wins

Page 29: Social Engineering: the Bad, Better, and Best Incident Response Plans

BetterImproving the Incident Response

Page 30: Social Engineering: the Bad, Better, and Best Incident Response Plans

Phone Social Engineering

Page 31: Social Engineering: the Bad, Better, and Best Incident Response Plans

National Retail Company• Impersonate an employee• Call helpdesk for password reset• Gain access to internal network and resources

Page 32: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 33: Social Engineering: the Bad, Better, and Best Incident Response Plans

Kirill Wright/Shutterstock

Page 34: Social Engineering: the Bad, Better, and Best Incident Response Plans

Quick Wins

Page 35: Social Engineering: the Bad, Better, and Best Incident Response Plans

Email Phishing

Page 36: Social Engineering: the Bad, Better, and Best Incident Response Plans

National Retail Company• Impersonate automated emails• Convince employees to log in to fake OWA pages• Gain access to internal network and resources

Page 37: Social Engineering: the Bad, Better, and Best Incident Response Plans

wk1003mike/Shutterstock

Page 38: Social Engineering: the Bad, Better, and Best Incident Response Plans

aurielaki/Shutterstock

Page 39: Social Engineering: the Bad, Better, and Best Incident Response Plans

Quick Wins

Page 40: Social Engineering: the Bad, Better, and Best Incident Response Plans

Physical Access

Page 41: Social Engineering: the Bad, Better, and Best Incident Response Plans

Email Marketing Company• Bypass fingerprint reader to gain access to office• Use USB device to gain code execution on a laptop• Gain access to internal network and resources

Page 42: Social Engineering: the Bad, Better, and Best Incident Response Plans

◉Picture of the fingerprint scanner

◉Picture of picked lock

Page 43: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 44: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 45: Social Engineering: the Bad, Better, and Best Incident Response Plans

Page 46: Social Engineering: the Bad, Better, and Best Incident Response Plans

Quick Wins

Page 47: Social Engineering: the Bad, Better, and Best Incident Response Plans

Best

Page 48: Social Engineering: the Bad, Better, and Best Incident Response Plans

Do you know what to do?

Page 49: Social Engineering: the Bad, Better, and Best Incident Response Plans

Does anyone else?

Page 50: Social Engineering: the Bad, Better, and Best Incident Response Plans

What happens when…

Employees start receiving large scale phishing emails?

All network shares are suddenly encrypted?

Malware is detected running on a computer?

Page 51: Social Engineering: the Bad, Better, and Best Incident Response Plans

Tailored Incident Response Plan• Identify the most common threats facing your company• Define and enforce incident response plans for these threats

Page 52: Social Engineering: the Bad, Better, and Best Incident Response Plans

Prepare

Identify

Contain

Eradicate

Remediate

Lessons Learned

Incident Response Lifecycle

Page 53: Social Engineering: the Bad, Better, and Best Incident Response Plans

https://cert.societegenerale.com/en/publications.html

Page 54: Social Engineering: the Bad, Better, and Best Incident Response Plans

Tactical Recommendations

Page 55: Social Engineering: the Bad, Better, and Best Incident Response Plans

Phone Social Engineering

Page 56: Social Engineering: the Bad, Better, and Best Incident Response Plans

Authentication for sensitive Actions• Require authentication before accessing sensitive

information• Focus training on employees who require access to sensitive

information• Remove access to sensitive information for those that don’t

need it

Page 57: Social Engineering: the Bad, Better, and Best Incident Response Plans

Email Phishing

Page 58: Social Engineering: the Bad, Better, and Best Incident Response Plans

Email Protections

Page 59: Social Engineering: the Bad, Better, and Best Incident Response Plans

Limit attacker options• Prevent email spoofing by implementing email protections• Monitor or buy domains similar to your own• Heuristic phishing detection• Identification of email recipients

Page 60: Social Engineering: the Bad, Better, and Best Incident Response Plans

Physical Access

Page 61: Social Engineering: the Bad, Better, and Best Incident Response Plans

U.S. Army Korea (Historical Image Archive) via Foter.com / CC BY-NC-ND

Page 62: Social Engineering: the Bad, Better, and Best Incident Response Plans

monticello/Shutterstock

Page 63: Social Engineering: the Bad, Better, and Best Incident Response Plans

Understand the perimeter• Turnstiles and guards for ingress points• Network access controls• Badges and escorts for guests• Screen lock policy• Host-based and network detection capabilities

Page 64: Social Engineering: the Bad, Better, and Best Incident Response Plans

Strategic Recommendations

Page 65: Social Engineering: the Bad, Better, and Best Incident Response Plans

Policy, Processes, People• Technical controls provide enforcement for policies and

processes• Without enforcement, social engineers will continue to

exploit the people

Page 66: Social Engineering: the Bad, Better, and Best Incident Response Plans

Enforce processes• When performing sensitive actions, focus on enforceable

processes• Authentication enforces who they are• Authorization enforces what they’re allowed to do

Page 67: Social Engineering: the Bad, Better, and Best Incident Response Plans

Conclusions

Page 68: Social Engineering: the Bad, Better, and Best Incident Response Plans

1. Every organization will be compromised by human error

2. Require policies and processes be enforced

3. Continued assessment improves risk mitigation capabilities

Page 69: Social Engineering: the Bad, Better, and Best Incident Response Plans

1. Every organization will be compromised by human error

2. Require policies and processes be enforced

3. Continued assessment improves risk mitigation capabilities

Page 70: Social Engineering: the Bad, Better, and Best Incident Response Plans

1. Every organization will be compromised by human error

2. Require policies and processes be enforced

3. Continued assessment improves risk mitigation capabilities

Page 71: Social Engineering: the Bad, Better, and Best Incident Response Plans

Rinse and Repeat

Social Engineering

Incident Response

Policies, Procedures, People

Enterprise Security

Page 72: Social Engineering: the Bad, Better, and Best Incident Response Plans

Any questions ?You can find us at:

• @bishopfox• facebook.com/bishopfoxconsulting• linkedin.com/company/bishop-fox• google.com/+bishopfox

Thanks!

Page 73: Social Engineering: the Bad, Better, and Best Incident Response Plans

CREDITSChristina Camilleri (@0xkitty) for the slide design!