SB Flashcards
Social engineering
People are integral to security, and their behaviour can’t always be controlled by policies
“Entire ruse was based on one of the fundamental tactics of social engineering: gaining access to information that a company employee treats as innocuous, when it isn’t” - Mitnick, 2001
Six principles of influence
Cialdini: RCASLS
Reciprocity
Commitment and consistency
Authority
Social Proof
Liking
Scarcity
“You say you’re an author or a movie writer, and everybody opens up” - Mitnick, 2001
-> Liking/social proof pretext
Final stage of social engineering attack
Escalation and exploitation
“Burning the source … allows a victim to recognise that an attack has taken place, making it extremely difficult to exploit the same source in future attacks” - Mitnick, 2001
-> Attacker maintains long-term access
Mitnick paper
Art of deception - shows how social engineers use harmless-seeming information to exploit systems
Kane Gamble
Gained access to sensitive accounts by impersonating customer service representatives, using social engineering to reset account credentials.
Targeted high-ranking CIA and FBI officials by pretending to be them, including posing as the CIA director to manipulate support staff into granting access.
Cheswick paper
1992 - describes the account of defending AT&T security system against the hacker, “Berferd” via honeypots (fake services)
Cyber-killchain and countermeasures+ limitations
Disrupts cyberattacks with steps:
Reconnaissance = gathering data
Weaponisation = creating exploit/attack payload
Delivery = transmitting payload
Exploitation = using payload to exploit weakness
Installation = setting up backdoor for long-term
Command and control = connecting system to attacker infrastructure
Actions on objectives = achieving attack’s goal
Countermeasures = detect, deny, disrupt, degrade, deceive
Limitations - focuses on technical attacks and assumes attacker has clear objectives
“Attackers have remarkable persistence, delaying them gives defenders time to identify their methods and plan responses”
Cheswick, 1992
-> Deception
IDS
Monitors system for unusual behaviour via misuse (attack patterns) or anomalies (deviations from normal behaviour)
“We led him on to study his techniques, feeding him false information to waste his time and protect real systems” Cheswick, 1992
-> Learning patterns, jail environment
Hutchings and Pastrana
2019, discuss the act of eWhoring which defrauds individuals online through fake personas
Silk Road
Was a darknet marketplace facilitating the anonymous trade of illegal goods, such as drugs and weapons using cryptocurrency
Types of organised cybercrime
Swarms - loosely coordinated groups with shared goals like Anonymous
Hubs - centralised groups with core members and supporting roles
Traditional organised crime groups which have extended online
“eWhorers capitalise on the emotional aspects of their victims, creating a sense of attachment or trust” - Hutchings and Pastrana, 2019
-> Example of a traditional method of crime that has moved online
Countermeasures and consequence of cybercrime
Human-focused interventions like warning messages or mass media campaigns
However this could just shift crime to new targets or methods
“Awareness and education are essential in equipping individuals with the tools to recognise and avoid eWhoring schemes” - Hutchings and Pastrana, 2019
-> Education for cybercrime
Cybercrime in recent times
Cybercrime has evolved significantly with more organised and professionalised methods
“Platforms should prioritise user safety by implementing stronger verification processes and reporting mechanisms” - Hutchings and Pastrana, 2019
-> Most cybercrime is profit-driven however some are idealogical and this evolution of cybercrime needs to be equally matched by platforms
“Tragedy of the Commons”
When individual actors prioritise short-term gains over collective security
“Buyers generally have no idea whether what they are buying is secure software, so a security lemon market is born—cheaper, less-secure products drive out more secure products.” (Rao et al., 2019)
-> Results of short-term gains and economic pressures
Rao et al.
2019, Explain importance of open source software and vulnerabilities due to insufficient incentives for security