Welcome!

Agile Computing Authors: Elizabeth White, Liz McMillan, Yeshim Deniz, Pat Romanski, Andy Thurai

Related Topics: Agile Computing, Cloud Security

Agile Computing: Blog Feed Post

Why Social Engineering Works

Hackers usually do some basic research to find out whom they need to use to construct a cover story

I have been to a couple of white hat security seminars over the past two weeks, one put on by Fishnet at the local SecureWorld Expo and another by Network Technology Partners. By white hat I mean people who are paid to break into their clients’ networks and demonstrate various security weaknesses. The biggest skill required? Wear a suit and smile. Sure, it is nice to have various gizmos and technical tools, but getting in the door is easy if you look nice

.

Social engineering, as this is called, isn’t new. Kevin Mitnick mastered this in the 1980s, although back then he was mostly trying to break into telephone switches. But what was interesting about both talks was how effective and how often these tricks were successful: some more than 85% of the time.

In both seminars, we saw how easy it was for the hacker to hang out by an employees’ entrance, or where the outdoor smokers congregate. Then they waltz right in, sit right down, and start connecting a laptop to the network within minutes. In one case, the hacker brought his own 19-inch server inside the data center and was helped by a Verizon technician to install the box on a rack. What made this funny was the hacker was posing as another Verizon engineer! I guess Verizon is a big company: you can’t expect to know everybody. But that is exactly the point.

In another case, the visiting hacker was challenged and escorted back to the front desk. But that was rare. Most people accepted that a stranger sitting in a nearby cube was just part of the scenery. In one case, the hacker had forged their badge and even put the words “Please stop me” right below their ID photo. No one bothered to look more closely.

Hackers usually do some basic research to find out whom they need to use to construct a cover story. Sometimes they hang out where employees spend their lunch hours at a nearby eatery. And LinkedIn can be a valuable tool to get names of systems that are being used, or names of IT employees that can give up this data. You don’t need much beyond a simple request: people are too trusting. Just say you are a recruiter and are looking for candidates for a six-figure job.

One of the speakers showed us an insidious tool: a necktie that has a pinhole HD video camera and can store video. Just wear the tie (see above), and then take it off and hang it on a hook with full view of the office. You can buy it for a couple hundred bucks, and then come back and download the video via a USB cable. This makes the surveillance seen in the movie “Closed Circuit” look like child’s play. There are other USB devices that can act as key loggers: who ever checks the back of their desktop PC on a regular basis?

At the SecureWorld show, the Fishnet guys set up their own rogue Wi-Fi hotspot. Within a few hours, they had more than a dozen attendees login to the thing and start typing their IDs and passwords, all dutifully captured by the device. Some of these hotspots look like power bricks – all you need to do to hide them in plain sight is to label them “property of the IT department” and most people won’t touch them. The same thing happens at Black Hat in Vegas, even though you would think that a conference full of security professionals would be more careful.

Social engineering is certainly alive and well these days, as always. The best security is to actually test these sorts of penetrations on a regular basis, and educate your employees to be less trusting. But it goes against human nature – at least here in the Midwest where folks are usually friendly by default – to challenge someone at the workplace. Still, we humans are the weakest link and all the firewalls and intrusion prevention systems can’t protect us against these simple exploits.

More Stories By David Strom

David Strom is an international authority on network and Internet technologies. He has written extensively on the topic for 20 years for a wide variety of print publications and websites, such as The New York Times, TechTarget.com, PC Week/eWeek, Internet.com, Network World, Infoworld, Computerworld, Small Business Computing, Communications Week, Windows Sources, c|net and news.com, Web Review, Tom's Hardware, EETimes, and many others.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, will exhibit at the 22nd International CloudEXPO | DXWorldEXPO. All In Mobile is a mobile app development company from Poland. Since 2014, they maintain passion for developing mobile applications for enterprises and startups worldwide.
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER gives detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPOalso offers sp...
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...