Since the creation of the
World Wide Web
, malware and other computer viruses have always plagued the internet.
Hackers are always trying to find easier and more effective ways to steal information from their victims.
However, as antivirus software and computer hardware becomes more secure than ever, hackers are finding it harder and harder
to create sophisticated malware that can bypass these security measures.
So, hackers started to turn away from creating
computer viruses, and began targeting the humans behind the screen. They began trying to retrieve information directly from
the victims by using a variety of tactics and techniques.
(In the context of information security)
the act of using deception to manipulate people into leaking confidential information
that may be used for malicious purposes is known as social engineering, otherwise known as human hacking.
There are many types of social engineering. They can occur anywhere where there is human interaction, virtual or physical. Social engineering is generally classified into two categories: digital and physical.
many call social engineering scamming. Indeed, this is mostly true. However, there is some nuance between these terms.
The definition of a scam is "to deceive and defraud someone" (Merriam-Webster). With the definition of social engineering, they are a form of a scam,
but scams can take on many other forms. Social engineering is simply a form of scamming.
Additionally, social engineering is often attributed to Indians, with their indian accent sounding remarkably similar to those who speak during social engineering attacks.
There is no solid evidence that most social engineering attacks aren't from India, it should be noted that social engineering attacks is a large-scale problem, and
prejudice against one group is bias.
This is by far more common than physical social engineering in this highly digital age. Below are the most common forms one will encounter, some being very ubiquitous, and others being very personalized and targeted.
This is the most common form of social engineering. Attackers use malicious emails, websites, or even texts to steal sensitive information from the victims. Often the attackers will impersonate trusted comapnies or sources like a bank or a legitimate company; deceiving individuals to click on malicious links, download malicious files, or even provide their personal credentials.
A classic example of phishing. The attackers impersonate American Express and claim the victim needs to update their information. That link will send them to a fake website and ask for credentials. Source: thesslstore
Spear phishing follows the same concepts as bulk phishing, but the attack is targeted at specific individuals or organizations. Attackers will reserach the targeted comapny or individual to create a more personalized attack which has a higher success rate. These attacks can be devasting since the attackers can easily compromise a company's whole security system through one spear phishing attack.
An example of a spearhead phishing attack. Notice that the attack is targeted at a company employee, who believes that they must sign a code of conduct agreement or be fired. The link likely will either infect the computer with malware or demand sensitive information in order to proceed. Source: Norton.
Attackers will create a scenario, or context to convince the victim to hand over sensitive information. The attacker may claim to be a colleague, IT support, or even law enforcement inquiring about sensitive information since it seems to be a part of a legitimate business acitivity. The success of this attack largely depends on attacker's ability to establish trust and credibility with their victims. They exploit their victim's desire to help or compliance with authority to extract confidential information. This attack is especially dangerous in a corporate setting, where employees may unknowingly grant unauthorized access.
Notice that pretexting is similar to spearhead phishing. The attackers do some research then create the context that the victim may be hacked. The link will send them to a phony website where when they put in their credentials, they are flatly giving those credentials straight to the attackers. Source: AVG AntiVirus
Baiting is a very powerful and deceiving tactic in the realm of social engineering. Attackers use a "bait" to trick victims into downloading files that contain malware when they appear to be legitimate. This is often combined with Pretexting and other techniques to make the attack more likely to succeed.
This a classic example of baiting. The attackers give an enticing reward for participation in a "survey". They likely will require you to download something to proceed, and that file will contain malware. This is also where the saying "too good to be true" shows itself. The reward truly is too good to be true. Source: Dummies.com
In quid pro quo attacks, attackers will provide a service or benefit to the victim in exchange for sensitive information. A common example is an attacker pretending to be IT support, claiming they can resolve a technical issue on their computer but demand the victim's credentials first. This technique relies on the victim's desire to be supported or assisted, and often these attacks only occur when the victim does need said assistance.
This Quid Pro Quo attack sets up a pretext that their email will be deactivated, and they can resolve the issue, but will ask for confidential information. Source: WALLIX
In a watering hole attack, cybercriminals hack into one or several websites that are frequently visited by a specific company or organization. The compromised website injects malware into the systems of its users who download it blindy. This is a very targeted attack and as a result, is devastatingly effective. The malware often goes undetected and steals massive amounts of data or compromise a system completely. This attack is also very difficult to avoid, as it leverages the trust the victims have with the website, and requires highly advanced cybersecurity measures to identify.
A diagram of a watering hole attack. Observe that the attacker never makes direct contact with the victims, so detecting and finding the source of one is incredibly difficult. Source: WeSecureApp
Attackers will bombard the victim with false alarms in a scareware attack. They relentlessly send false messages that their computer has been hacked or has severe malware installed on it. By clicking on one of the notifications, the attackers demand that you install an "antivirus" program to remove the threats. Once downloaded, the software installs real malware, stealing data and may hold that data for ransom. This attack purely relies on fear, as the constant bombardment of alerts forces one to act fast, and make rash decisions.
A typical scareware pop-up. Notice that it combines the fear of being hacked and the pressure to act now as it says "files and app deletion may start at any moment". Source: University of Louisiana Monroe
Physical social engineering attacks are less common than digital attacks, but when they do happen, they are devastatingly effective. These attacks are usually targeted at companies, but they may also happen to individuals who have valuable assests that attackers may want.
Social engineering is by far the most common form of a cyberattack; but exactly how ubiquitous and common are they? Below are several statistics about social engineering.
Tailgaiting is where an unauthorized person follows an authorized person into a secure area. The authorized person identifies themselves
via an ID card and the unauthorized person follows them into the area without providing any identification. From there, they have free reign over
the secure area, able to steal confidential information without anyone batting an eye.
A common trick used to make tailgaiting easier is the "coffee trick". An unauthorized person walks towards a secure door, holding a cup of coffee in each hand.
An authorized person wanting to be helpful, holds the door open to let them in, and suddenly the attacker has breached the secure door. Simple as that.
Dumpster diving is where attackers search through a company or individual's trash for valuable information like ID numbers, passwords, serial numbers, and other information. They then use this information to launch a cyberattack at the company or individual. This attack may seem ridiculous, how can trash contain this type of information? However, important documents containing this type of information may not be disposed properly and simply put into trash cans, where attackers can dig it back up and use it.
This attack is as simple as it sounds: attackers watch a victim while they enter passwords and other sensitive information. These attacks don't even have to be at a close range, the attackers can watch the victim through binoculars or hidden cameras. This attack is quite rare, and really only happens in corporate settings or if the individual targeted is very special.
Social engineering is by far the most dangerous cyberattack there is, so why does it see so much success? What is there to learn from it?
Social engineering comes in many forms, but they all use one common weakness: Social engineering takes advantage of basic human tendencies and decision-making flaws. It exploits human emotion and most importantly, our trust in others.
Objectively, trust is a good thing. It is what allows us to establish friendships and let us communicate freely with the people around us.
However, in the realm of cybersecurity and security as a whole, it is the greateset weakness humans have. The natural human impulse to trust those around us is exactly what makes humans vulnerable to social engineering attacks.
All phishing attacks occur because the victim trusted that their sensitive information is safe and with the legitimate company.
Prextexting can succeed purely because the victim places all their trust in the attacker.
Watering hole attacks are so effective because the victims trust the website they are on and so they will blindly download files from it.
Trust is one of man's defining tendencies, so attackers will always exploit it.
Often, social engineering attackers will play on human emotions; one of the most dominant and dangerous one is sympathy, or the desire to help others.
Naturally, humans want to be helpful and assist others, a great virtue in the world.
However, this sympathy can be dangerous, since people often try to help others even if the request is unusual or suspicious.
Attackers capitalize off this natural instinct by portraying themselves as people in need; they pretend as if they are in dire straits, purely to try to trigger that sympathetic emotion.
Some pretexting attacks pose the attacker as a pitiful colleague or friend who really needs money or some other assistance.
The "coffee trick" mentioned above works because the bystander wants to assist the person holding the cups of coffee.
Sympathy is a very powerful emotion, one that often induces someone to act without thought,
a very valuable emotion that attackers use.
Fear is another very powerful tool hackers use to increase their chances of succeeding.
Drilled into human minds as part of the fight-or-flight response, when intense fear is exerted on a person's brain; it acts without thinking at all, a natural reaction to fear.
As a result, they will do things that normally they wouldn't do, like downloading a malicious file that the attacker told them to do.
Fear is used in many pretexting attacks, and is the sole driving factor of scareware attacks.
Fear is an emotion that is deeply rooted in man's brain,
so it is a very powerful thing that attackers can use to obtain sensitive information.
With all the information we've learned, how do we stop social engineering?
Below are some general tips to not only defend yourself from social engineering attacks, but also from cyberattacks as a whole.
To defend yourself from fraudulent emails, look for any of these signs:
If the message is demanding you to do something immediately, then it likely is a phishing attack.
If the email is allegedly from a company, look at the sender's email address. If it looks strange and not normal, then it likely is not legitimate.
Reputable companies have a dedicated emailing staff to ensure that the emails they're sending are professional and high-quality. If a message or email has obvious grammar mistakes or spelling mistakes, then it very well may be a scam. This is likely due to the attackers trying to translate the content of the email from a foreign language.
This is a warning sign that many overlook. If the email is supposedly from a company or organization you work with, then the organization will personalize the email and use your name at the beginning. If the email simply says "Dear sir or madam", it is a warning sign that the sender is not actually the company or organization it claims it is.
The best thing we can do to stop social engineering attacks is to educate and inform others about these attacks.
Social engineering is most dangerous against those who are uneducated about these attacks and unaware about these dangers. Educating yourself about these dangers is a good start; but ultimately, we must educate everyone to truly stop social engineering attacks.
Don't take the bait.