You are on page 1of 5

Social Engineering – Facts, Myths and Countermeasures

Eakan Gopalakrishnan
School of Electronics and Computer Science, University of Southampton
eg5g09@ecs.soton.ac.uk

Abstract
2. Social Engineering and its Impacts
There are several ways of stealing information;
most of them, done by exploiting the technical factors Incidents till date have shown that attacks often
of security and some, by exploiting the non-technical result in network outage like denial of service or fraud,
factors. Social Engineering is a hacking technique that identity theft and industrial espionage [4]. Even the
relies on weaknesses in humans rather than software FBI has been a victim of such social engineering
systems and it has proved to be much cheaper, safer attacks; Robert Hanssen case [17], proves that even the
and effective way of stealing information than best of security measures cannot prevent social
technical hacking. This aspect of security has gained engineering attacks.
focus only in recent years and there has not been any The financial losses that a social engineering attack
foolproof solution to prevent a social engineering could cause can be very high, in fact insurers are
attack. Social engineers are often professional hackers beginning to cover losses arising through security
who combine their technical skills with soft skills to breaches. Small to medium sized companies could
achieve the information that they require. This even go bankrupt due to such attacks. But the cost of
technical report takes a deeper look into the research reputation and goodwill of the company is the biggest
that has been done in this and related fields and lists impact of any security breach; be it technical or non
out various methods taken and weaknesses exploited technical; but non-technical attacks often leave a
by a social engineer and also provides a list of company humiliated, with negative media publicity,
countermeasures that can possibly be taken to deal possible legal proceedings or settlements, increase in
with it. surveillance and interference from regulatory
authorities, fines and other regulatory consequences.
1. Introduction
3. Motivation for Attack
Threats to information are mainly of three types:
technical, physical and human in nature and today, we Motivation for social engineering attacks or any
are in the third generation of the information security hacking attack could be similar to that of any other
evolution, which has evolved from its initial focus, crime. Some of them are: i)Wealth: the financial gain
which was on the security of the technology, to focus achieved through the attack. ii)Curiosity: personal
on process related security and now, to the current interest in the field of hacking, or mere curiosity to
focus on the human element that manages or uses the know how things work. iii)Revenge: for satisfying
technologies and processes in place. This shift in focus egocentric desires because of bitter experience caused
has only happened because of the realization that by someone or a previous employer.
technology and processes are only as good as the
humans that use them [2]. 4. Methods of Attack
In simple words Social Engineering also called
“human hacking” was made famous by Kevin Mitnick. A typical Social Engineering attack involves i) a
His book [5] describes various methods of human thorough background information collection of the
hacking through a series of anecdotes. His life and target company or person ii) use of the background
stories made out of incidents in his life [15] [16] give information to attain further details mostly through
very detailed descriptions of how simple phone calls impersonation techniques iii) the next step would either
could help in retrieving highly sensitive and lead to the required information or back to step 2. This
confidential information from a variety of sources. loop can go on many times The attacks can be
In the next few sections the impacts, methods, classified in many ways but one particularly good way
concept of social engineering and some of doing it is into two broad classes [4]: i) human
countermeasures shall be elaborated.
based approach through face-2-face (Direct) little, like a new comer who does not know how things
interactions to force the victim to give information and work. xiv)Affiliation: name dropping, proclaiming
ii) technology based (indirect) approach that deceives association with collective organizations reduces the
the user through electronic communication. victim’s suspicion on the attacker’s motives. xv)Road
Apple: the attacker leaves something like a CD or
4.1. Direct Approach portable storage medium, which looks legitimate and
also like it was classified as top secret or intriguing
Hackers often have good people skills. In the direct where the target might find it and would possibly try
approach the hacker creates a psychological situation and use it. On running, it would install a Trojan or sort
or environment for getting information through direct and collect information that is required and send back
interaction. This can be done in several ways and some to the attacker. xvi)Desktop Hacking: usually done
of them are listed here [4] [8] [1] [14] [7]: i)Friendship: when targets forget to lock their desktop systems and
obtaining information by being a friend of a potential leave for a while, the attacker uses the opportunity to
victim. This makes use of the human weakness of take a sneak peek into the target’s files for information.
complying readily with people they know. The methods listed above are mostly psychological
ii)Impersonation: creating a character and playing out a tactics of persuasion. Generally a hybrid of the above
role to deceive and obtain information. iii)Conformity: mentioned attacks are used to obtain sensitive
making use of the fact that if you behave like everyone information. Different methods are used depending on
else, you’ll be considered one of the herd; also known factors like the source of information, the level of
as social proof, often used to convince an employee security that it is stored in, etc.
that other employees have complied to the request.
iv)Responsibility diffusion: convincing an employee 4.2. Online Method
that their colleagues have complied to the request in
spite of that being a breach of the security policy, Although social engineering is mostly done in
thereby making the employee feel it’s not just him who person, it can also be done using the internet. While the
would be responsible. v)Decoy: exploiting the human direct approach focused on obtaining trust and getting
weakness of being able to focus on one thing at a time. sensitive information like passwords from the person
Creating distractions that mislead others, targets are with consent, such methods often focus on getting
distracted from their usual security focus. vi)Reverse passwords without consent. One weakness that makes
Social Engineering [18]: getting the target come and this method very successful is that many users often
offer the attacker what he requires. This technique keep the same password for all their accounts including
requires a great deal of preparation and research financial institutions.
beforehand. The decision to comply with this type of Some of the ways in which this can be done are: [4]
attack is mostly because of the reciprocity rule; the act [7] i)Awards: attackers send out enticing offers or
of returning a favour. vii)Commitment: people tend to “awards” and ask the user to enter their personal
agree to further requests of the attacker if they are in information. ii)Pop-up windows: duplicate windows
keeping with prior commitments. viii)Scarcity: people resembling the originally intended web site could pop
value opportunities that are less available. Target can up and make the victim unknowingly type in login
be pressurised to give out information when he thinks information to this new pop up window. iii)Network
help from normal channels is only available for a Sniffing: monitoring network traffic for passwords;
limited time. This is also used in phishing mails where mostly done by gaining confidence of someone who
limited time offers are given. ix)Authority: has authorized access to the network. iv)Email: emails
impersonating someone with authority. Human containing malicious software that collect user
weakness of obedience to authority works here. information without the user’s knowledge. v)Phishing:
x)Sympathy: An attacker eliciting that he needs help this is a popular form of social engineering which
can win over a target’s sympathy and gradually involves using email and web sites that look like those
achieve what he wants. xi)Guilt: an attacker could of well known businesses or institutions to deceive
convince their victims that he would suffer greatly if users into disclosing information. There are different
they didn’t comply to his request, thereby making them variants of phishing too. vi)Harvesting Social
feel guilty for his situation and giving out sensitive Networks: use freely available personal information
information. xii)Equivocation: The method of from social networking web sites. vii)Instant
deliberately creating ambiguity or uncertainty in the Messaging and IRC software often allow running
request which starts out sounding reasonable to the complex scripting and dynamic content this is also
victim and turns out to be something else. used by attackers.
xiii)Ignorance: Impersonating someone who knows
comes to complying with a request; the attacker only
4.3. Background Information Collection triggers the weaknesses in humans that result in a
favourable response; which explains why humans are
Before attempting a social engineering attack a lot truly the weakest links in a security system.
of background information is to be collected [9] [4]
[7]. Some of the ways of doing this are listed as 6. Why it still works?
follows: i) Research on Available Sources: most of the
background information required to prepare for the An attacker should possess skills and tools
attack is often or almost always available online. necessary for the attack, like a good opportunity to
Searching an open source of information like the web execute the attack and have a motive behind the attack.
is the best way to obtain background information about When all three factors are in place, the attack is almost
a person or a company. ii)Dumpster Diving: This is the always successful. Humans tend to act or take
method of collecting information without interacting decisions according to three factors, the user, the
with people and by just searching in individual or technology and the environment/context in which the
company dumpsters that might contain sources of vital interaction takes place as explained previously in
information like phone books, address books, official section 4.1 and 4.2 [3]. Psychological factors like
calendars, invoices, system manuals, printed source credibility, pressure, in-attention etc. help in deceiving
code, storage devices, policy manuals, etc.. a person.
According to [5] potential targets are usually: those
5. Previous Models of Social Engineering who are unaware of the value of information, those
who have special privileges, organizations that
The closest research work associated in this area is manufacture hardware of software, specific
in the area of Trust. Trust is subjective. The decision to departments that have potentially valuable information.
trust someone or not may be intentional, or Now that would mean that anyone who has access to
subconsciously taken. The Click and Whirr approach any part of the system would be a potential target.
[12], [13], [14] is an easy method of manipulating Even today technologies like firewall are given more
trust. Humans have a tendency to automatically than required attention while people and processes are
respond to stimuli, fixed action patterns, which can be being overlooked partially or completely. Mitnick
activated by a trigger feature. The phrase Click and sums it up as “You could spend a fortune purchasing
Whirr is explained in [14] as “Click and the technology and services...and your network
appropriate tape is activated, whirr and out rolls the infrastructure could still remain vulnerable to old-
standard sequence of behaviours”. Humans tend to fashioned manipulation.” This vulnerability is mostly
comply to a request if a reason is also given with it, due to lack of awareness of such attacks among
even if that makes no sense. The “because” triggers the employees of organization; due to the fact that some
standard sequence of behaviours. The contrast organizations underestimate such social engineering
principle is the key to persuasion, which states if there attacks and often ignore this in their employee security
exists a difference between two things, we tend to see a awareness programs.
greater difference than that actually exists. A Humans always tend to retain their weaknesses in
persuasive request should resonate within their spite of training or awareness, thus there still lies an
audience; should stimulate stored impressions, hopes, opportunity for the attacker.
fears and desires, by suggestion. A person’s
compliance to another person’s request can be 7. Countermeasures
understood in terms of human tendency to shortcut
response [11]. This set of standard responses often D. Cragg developed a multi-level defence
depends on the trust involved. If the attacker attains the mechanism against social engineering attacks [10];
target’s trust then he is likely to get what he requested which is indeed the best defence strategy against social
for. This trustworthiness of an attacker is again engineering; so that even if a hacker penetrates one
dependent on four factors: benevolence, reputation, level, he would be stopped at the other. It has levels
performance and appearance of the attacker; where that address specific categories of people, environment
benevolence is about the perception of good or bad and technology, that includes spreading awareness [6],
intentions, reputation is about the past deeds, setting up a good security policy, providing resistance
performance is about the external features, dress, training to individuals who does key support jobs,
worldly possessions or lack of it, and actions. In fact putting up a call back servicing policy for requests to
the social engineer is not the real opponent when it helpdesk pertaining to authorization or password
change, secret or bogus questioning policy for help Assignment, SANS Institute 2003,
desk personals and methods to finally respond to an “http://cnscenter.future.co.kr/resource/security/hacking/1232.
attack. And for security policy designers, Technique pdf”
for Human Error Rate Prediction be used [3]to
[9] Granger, S. (2001) “Social engineering fundamentals,
quantify the vulnerability levels in different system-
Part I: Hacker tactics”, Cited on 9 November
human setups. 2009, “http://www.securityfocus.com/infocus/1527”

8. Conclusion [10] D. Gragg, “A Multi-Level Defense against Social


Engineering”, SANS Reading Room, 2003,
Humans are prone to making errors and as social “http://southwestans.com/Resources/docs/social/A%20Multi-
engineering is an attack on human weaknesses it is Level%20Defense%20Against%20Social%20Engineering.pd
f”
quite impossible to prevent such attacks. Human
factors research has provided many contributions to [11] P. Sztompka, “Trust: A Sociological Theory”,
reduce human errors. Incorporating such techniques by Cambridge University Press, 1999
conceptualizing the system as an inter-related
mechanism of humans, technology and environmental [12] S. Chen, S. Chaiken, K. Duckworth, “Motivated
factors and by creating a multilevel defence strategy Heuristics and Systematic Processing”, Psychological
would help in mitigating social engineering attacks Inquiry, Vol 10, No.1, 1999,
even though its risk cannot be completely eliminated. “http://www.jstor.org/pss/1449522”

[13] R.E. Petty, D.T. Wegener,”Thought Systems, Argument


9. References Quality and Persuasion”, Advances in Social Cognition :
Content, Structure, Operation of Thought Systems, Vol. 4,
[1] P. O. Onkeyi, T.J. Owens, “On the Anatomy of Human LEA, Chapter 8, pp. 147-162
Hacking”, Information Security Systems, Vol. 16, no.6, pp.
302-314, Nov 2007 [14] R.B. Cialdini, “Influence: Science and Practice”,
“http://www.influenceatwork.com/Media/RBC/Influence_SP
[2] M. Dontamsetti, A. Narayanan, “Impact of Human .pdf”, 2001
Element on Information Security”, Social and Human
Elements of Information Security: Emerging Trends and [15] J. Littman, "The Fugitive Game: Online with Kevin
Countermeasures, Information Science Reference, Section 1, Mitnick", Little Brown and Company (Canada) Limited,
Chapter 3, pp. 27-42. 1997

[3] R. West, C. Mayhorn, J. Hardee, J. Mendel, “The [16] J. Markoff, "Takedown: The Pursuit and Capture of
Weakest Link: A Psychological Perspective on Why Users America's Most Wanted Computer Outlaw", 1995
Make Poor Security”, Social and Human Elements of
Information Security: Emerging Trends and [17] Robert Hanssen sentenced to Life Prison, Chicago
Countermeasures, Information Science Reference, Section 1, Tribune, 4th July, 2001.
Chapter 4, pp. 43-60. http://www.encyclopedia.com/doc/1G1-120411617.html

[4] L. Laribee, “Development of Methodical Social


Engineering Taxonomy Project”, Thesis at Naval [18] E. Nelson, R. “Methods of Hacking: Social
Postgraduate School, Monterey, California, June 2006 Engineering,” the Institute for
Systems Research, University of Maryland, 2001.
[5] K. Mitnick, W.L. Simon, “The Art of Deception:
Controlling the Human Element of Security”, John Wiley and
Sons, October 2002
10. Bibliography

[6] C. Rhodes, “Safeguarding against Social Engineering”, [19] C. Pfleeger, S. Pfleeger, Security in Computing, 4th
East Carolina University, 2007, Edition, Pearson Education Inc, 2006.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.
5142&rep=rep1&type=pdf [20] S. McClure, J. Scambray, G. Kurtz, Hacking Exposed 6
: Network Security Secrets and Solutions, McGraw Hill
[7] M Nohlberg, “Social Engineering: Understanding, Publishers, 2009.
Measuring and Protecting Against Attacks”, Thesis Proposal,
University of Skovde, Sweden, June 2007. [21] K. Mitnick, W. Simon, The Art of Intrusion – The real
stories behind the Exploits of Hackers, Intruders and
[8] R. Gulati, “Threat of Social Engineering and your defense Deceivers, Wiley Publishing, 2006.
against it”, GIAC Security Essentials Certification Practical
[22] G. Notoatmodjo, “Exploring the Weakest Link: A study
of personal password security”, Thesis submitted at
University of Auckland, New Zealand, December 2007

[23] J. Rusch, “The ‘social engineering’ of Internet fraud”,


Paper presented at the 1999 Internet Society's INET'99
conference,“http://www.isoc.org/isoc/conferences/inet/99/pro
ceedings/3g/3g_2.htm”

[24] M. Gupta, R. Sharman, Social and Human Elements of


Information Security: Emerging Trends and
Countermeasures, Information Science Reference, 2009.

You might also like