[EN]Social Engineering - Human weakness
security·@security101·
0.000 HBD[EN]Social Engineering - Human weakness
Many people understand the term IT security as the technical security of systems. In order to be able to comprehensively protect systems, however it is necessary to see security as a whole picture, in which a potential attacker always looks for the easiest way. In this article, the relevance of social engineering in the area of IT security will be demonstrated. https://wraysec.com/wp-content/uploads/2015/10/Social-engineering-security.png [Source](https://wraysec.com/wp-content/uploads/2015/10/Social-engineering-security.png) ## What is social engineering? Social engineering refers to the possibility of getting confidential information and data from person to person on a social level. The weak point here is therefore not of a technical nature, but the human being who is manipulated with partly psychological tricks. The targets range from identity and data theft to industrial espionage. Among other things, attackers make use of the following features: - People want to avoid anger and conflicts in principle - People would like to help other people - People like to be respected - People have the need to trust other people. Social Engineers make use of these features (and some more) in a targeted way, for example by using: to appeal to the **Assistance**: >*I am a colleague from the marketing department. I just need to answer a quick e-mail. My PC has already been shut down. Can I use your computer for a moment while you're taking a break?* to **flatter** someone: >*I am a journalist and write about creative entrepreneurs in the FinTec area. I noticed you very positively. Do you have a few minutes? I would like to ask you about your person and current intentions* This now seems strange, but the success rate of such attacks is enormously high. A good social engineer knows how to build trust in people with small talk, for example. Basically, a social engineering attack can be divided into the following steps: ###### 1. Collect information ###### 2. Make contact. ###### 3. Pretending a false identity. ###### 4. Get information. ###### 5. Make yourself inconspicuous and quick as possible go on the run ###### 6. Applying the "captured information." --- ## What types are there? There are a lot of different types of social engineering attacks. The following is a brief overview of known procedures. ### Phishing Phishing is the most commonly used variant of social engineering. In this case it is usually in the form of a spoofed (falsified / copied) internet page or e-mail as someone else. Further information on phishing and common variants is already described in a [contribution in German](https://steemit.com/it-sicherheit/@security101/phishing-teil-1-was-ist-es-und-wie-findet-es-statt)(If you would like to read that in English too i will translate this article). That is why I do not want to go into it any further at this point. Interesting facts and figures can be found in the [APWG Phishing Reports](https://www.antiphishing.org/resources/apwg-reports/). ### USB Dropping https://www.heise.de/ct/zcontent/15/05-hocmsmeta/1424038924376709/contentimages/image-1422861464570069.jpg [Source](https://www.heise.de/ct/zcontent/15/05-hocmsmeta/1424038924376709/contentimages/image-1422861464570069.jpg) Who isn't curious when they find a USB stick? Maybe you just want to track down the person who lost the stick. The first intuition is often:"Let's see what's on it". This is very dangerous, however, as malware can get onto the systems via modified firmware or a minicomputer disguised as a USB stick. ### Dumpster Diving The term itself already reveals what happens here: Paper waste containers are searched for sensitive information. It is not for nothing that there are document shredders that should be used when documents are confidential. Here, too, it is sufficient if an employee throws away a post-it with a note of a password carelessly. # Shoulder Surving Especially when working on the move, it is possible that a social engineer looks over your shoulder at work. <center> http://www.datarecovery.co.nz/wp-content/uploads/2015/03/Shoulder-surfing-2.jpg [Source](http://www.datarecovery.co.nz/wp-content/uploads/2015/03/Shoulder-surfing-2.jpg) </center> Therefore, you should be careful not to let anyone see anything, especially if passwords are entered or sensitive data is being processed. What you probably do intuitively when entering your PIN at the ATM should also be done, if you enter your access data on your PC/smartphone. ### Tail Gating An attempt is made to enter secure areas without access authorization. Running after someone and walking through the door is usually very easy. If someone with a big and seemingly heavy cardboard box would come along, you would surely be nice enough to stop the door for the poor man.... wouldn't you? --- ### further proceedings In addition to the approaches mentioned here, there is much more. Depending on the situation, social engineering attacks can be planned for a very long time. This could go so far as to fake a partnership in order to obtain the relevant information. --- ## How can I protect myself? Since people themselves are "attacked" here, it is also necessary to "protect"them primarily. After reading this article, you already have a basic understanding of the existence of social engineering and what such attacks might look like. In principle, it is important to be sensitive to attack vectors of this kind. I'm not saying you're not supposed to be nice anymore, stopping someone's door or helping them with problems. The basic knowledge and security awareness often helps to detect social engineering attacks. In the environment of companies, a policy is recommended which must be adhered to. In addition, it makes sense to develop awareness trainings that address specific application scenarios depending on the position and activity within the company and help to build up security awareness. <center> https://i.imgur.com/NLy7ba1.png </center> <center> Thank you for reading! Stay safe, but don't exaggerate ;) http://4.bp.blogspot.com/-3nlFaaTBfmY/T0OVuJ0jlPI/AAAAAAAAAko/wnpTqT4Rlc0/s1600/Shoulder+Surfing.jpg [Source](http://4.bp.blogspot.com/-3nlFaaTBfmY/T0OVuJ0jlPI/AAAAAAAAAko/wnpTqT4Rlc0/s1600/Shoulder+Surfing.jpg) </center>