📜 ⬆️ ⬇️

Social engineering: the elusive enemy in the cybersecurity world


Protecting corporate information, networks and workstations from constantly changing external and internal threats is a task similar to firing at a moving target. And social engineering makes this work an almost impossible feat. Activities aimed at "hacking" of human consciousness, as a rule, are invisible and can penetrate very deeply into the enterprise system.

What is social engineering?


In a broad sense, this concept covers any situation in which criminals play on the peculiarities of the human psyche and manipulate individuals so that they violate the usual security procedures and protocols. Attackers do not attempt to penetrate the corporate network through system vulnerabilities. Their attacks are directed at people. And they themselves share confidential information that gives access to office space, systems or networks.

Even if an organization has the best cyber defense systems, firewalls, and procedures, it still might one day turn out that the cybercriminals managed to get important sensitive data.
')

Attack structure


The attack with the use of social engineering methods is always thought out and adapted to the individual characteristics of the object of attack, in contrast to the usual phishing attacks with mass random sending of emails or calls to thousands of people. It requires more preparation, but the chances of success are also many times higher.

First, attackers are looking for specific information about the target company, its organizational structure and employees. Their actions can be directed against employees of certain departments or against any people with a low level of access to systems, through interaction with whom it is possible to reach higher levels. The idea is not to search for a weak link in the security system, but to detect a vulnerable person. Playing on his fears, greed, or curiosity, attackers force him to break the protocol.

To do this, the offender is looking for information online and offline sources and identifies potential victims. The Internet and social media have greatly simplified access to such data.

So, a good starting point for indirect action is organization charts. Social networks like LinkedIn and Facebook are a wealth of information. For example, on LinkedIn it is very easy to find a list of people working in a particular division of a company. Next, you can watch their behavior on Facebook to calculate the most trusting individuals. After that, it remains to get their contact information (email address, phone number).

The attackers are trying to earn the trust of the victim or play on the feelings of fear and haste, so that people do not have time to think about the situation.

Examples of attack scenarios:










Why are social engineering attacks more dangerous?


The social engineering approach is always more complex than other cyber attacks, and therefore they pose a significant threat. Here are some reasons that make social engineering more dangerous than other attacks:










Precautionary measures


Attacks using social engineering methods are quite sophisticated, and it is not easy to stop them or at least detect them. As noted earlier, hacking detection systems in this regard may not be sufficiently effective. However, there are some practices that are useful in preventing attacks:

















Attackers have to make serious efforts to coordinate the attack. However, there are many websites and specialized online forums that help inexperienced criminals to improve their social engineering skills with ready-made software and detailed theoretical information. Therefore, the protection of the organization from such illegal activities will require increased activity and attention. But all efforts will pay off in full, because it is a way to avoid incidents similar to what happened in Target.

image

Source: https://habr.com/ru/post/423285/


All Articles