19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5: Social Engineering<br />

In some well-publicized incidents, hackers e-mailed their victims a patch purporting<br />

to come from Microsoft or another well-known vendor. Users think it<br />

looks like a duck and it quacks like a duck — but it’s not the right duck! The<br />

message is actually from a hacker wanting the user to install the “patch,”<br />

which installs a Trojan-horse keylogger or creates a backdoor into computers<br />

and networks. Hackers use these backdoors to hack into the organization’s<br />

systems or use the victims’ computers (known as zombies) as launching pads<br />

to attack another system. Even viruses and worms can use social engineering.<br />

For instance, the LoveBug worm told users they had a secret admirer.<br />

When the victims opened the e-mail, it was too late. Their computers were<br />

infected (and perhaps worse, they didn’t have a secret admirer).<br />

The Nigerian 419 e-mail fraud scheme attempts to access unsuspecting<br />

people’s bank accounts and money. These social engineers — I mean scamsters<br />

— offer to transfer millions of dollars to the victim to repatriate a<br />

deceased client’s funds to the United States. All the victim must provide is<br />

personal bank-account information and a little money up front to cover the<br />

transfer expenses. Victims then have their bank accounts emptied. This<br />

trap has been around for a while, and it’s a shame that people still fall for it.<br />

Many computerized social engineering tactics can be performed anonymously<br />

through Internet proxy servers, anonymizers, remailers, and basic<br />

SMTP servers that have an open relay. When people fall for requests for confidential<br />

personal or corporate information, the sources of these social engineering<br />

attacks are often impossible to track.<br />

Social Engineering Countermeasures<br />

You have only a few good lines of defense against social engineering. Even with<br />

strong security systems, a naïve or untrained user can let the social engineer<br />

into the network. Never underestimate the power of social engineers.<br />

Policies<br />

Specific policies help ward off social engineering in the long term in the following<br />

areas:<br />

✓ Classifying information so that users don’t have access to certain levels<br />

of information they don’t need<br />

✓ Setting up user IDs when hiring employees or contractors<br />

✓ Establishing acceptable computer usage<br />

77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!