Risk & Business Magazine Spectrum Insurance Fall 2019 | Page 26

SOCIAL ENGINEERING I n part one of our series on Social Engineering, we discussed how cybercriminals have shifted their focus away from purely technological attacks to attacking employees through the use of social engineering—a collection of techniques used to manipulate people into performing actions or divulging confidential information. We also reviewed recent court rulings to illustrate that computer fraud and funds transfer insuring agreements in traditional crime policies may not provide coverage in the event of a social engineering claim. In the second part of our series, we identify examples of schemes employed by social engineers and how to design and implement comprehensive security practices to mitigate the risk of a loss. SOCIAL ENGINEERS PREY ON INNATE HUMAN EMOTIONS Social engineers use technology to swindle people and manipulate them into disclosing passwords, revealing banking information, or granting access to their computers. Understanding how these social engineers work and the schemes that they employ is key to implementing successful internal controls that minimize risk. The success of social engineering schemes does not always rely upon sophisticated software or hacking technology. Social engineers exploit human emotions—such as fear, curiosity, the natural desire to help, the tendency to trust, and laziness— to bypass the most ironclad security measures. Social engineering schemes, therefore, remain one of the most foolproof and commonly used methods to breach secure systems. In the cyber world, the weakest link in the security chain is the employee who accepts a person or scenario at face value. Social engineers target this vulnerability. A few common examples illustrate how social engineers take advantage of human emotion. MESSAGES FROM TRUSTWORTHY SOURCES Social engineers cleverly manipulate the natural human tendency to trust 26 and accept representations at face value. Human nature leads us to trust others until they prove that they are not trustworthy. If someone tells us that they are a certain person, we usually accept that statement. "SOCIAL ENGINEERS USE TECHNOLOGY TO SWINDLE PEOPLE AND MANIPULATE THEM INTO DISCLOSING PASSWORDS, REVEALING BANKING INFORMATION, OR GRANTING ACCESS TO THEIR COMPUTERS." Seizing upon this trait, cyber criminals commonly hack email accounts to gain access to the owner’s contact list. Once access to an email account has been obtained, the cybercriminal can send messages to all the owner’s contacts. These messages prey on trust and curiosity. For example, the social engineer may send: • a link that you “just have to check out.” Because the link comes from a friend, and humans are naturally curious, the recipient is likely to click on the link. As a result, the system becomes infected with malware that the criminal can use to take over the machine and collect information. • a file to download (disguised as pictures, music, a movie, a document, etc.) that is embedded with malicious software. Once downloaded, the system is infected. Now, the criminal has access to the system. PHISHING SCHEMES Phishers seize on fear and gullibility to obtain private information. Phishers send emails, instant messages, or text messages that appear to derive from a legitimate or popular company, bank, school, or institution. These messages explain that there is a problem that requires you to “verify” information by clicking on the displayed link and entering information into a form. The link location may look legitimate (often containing the correct logos and content copied from a legitimate website). The spoofed site closely resembles a legitimate site and tricks the user into entering their credentials, thereby enabling the social engineer to implant malicious programs or spy on the user’s computer activity. BAITING SCENARIOS Social engineers also use greed to manipulate human operators. Often found on peer-to-peer sites offering a download of a hot new movie or music, social engineers dangle something people want and wait for people to take the bait. Once people take the bait, the cybercriminal uses malicious software to corrupt secure systems and steal confidential information or banking details. IMPERSONATING SUPERIORS Impersonation is one of the most common social engineering techniques. Impersonation can occur over the phone or online. For example, a social engineer may obtain the name of someone in the organization who has the authority to grant access to confidential information. Using that information, they call the target and claim that a senior official authorized the disclosure of information or transmission of funds. Similarly, a social engineer may impersonate a network administrator or help desk member and ask for an employee’s username and password (so they can ostensibly troubleshoot a network problem or trace a problem). These schemes prey upon the desire to be helpful and fear of being reprimanded. Many employees receive a negative reaction from superiors if they do not act promptly or take too long to complete a project. Fearing reprimand, many employees want to be helpful and follow directions—which can lead them to giving away too much information.