visit
The act of deceiving an individual into revealing sensitive information, obtaining unauthorized access, or committing fraud by associating with the individual to gain confidence and trust.When thinking about hacking, we all think of an image about someone wearing a hoodie and sitting in front of a computer and typing swiftly. Suddenly, something pops up on the screen, and the hacker gains ultimate freeway access to the system.The notion of hacking humans instead of computers to gain access might sound strange, but it is not. Criminal hackers do not care how they get in but how fast they can get in. If hacking humans is more manageable than computers, then it is the way to go.Social Engineering attacks are a broad definition that typically involves some psychological manipulation, following otherwise unsuspecting users or employees into giving up sensitive data or confidential information. The most popular information hackers want to get from a social engineering attempt is credentials.Social engineering could be in different forms that sneak into our daily operations, such as dropping a USB drive in the targeted company's lobby, hoping that someone inside the company would pick it up and plug it into the company machine in an unlocked state.
Pretexting is a method of inventing a scenario to convince victims to divulge information they should not divulge. Pretexting is often used against corporations that retain client data, such as banks, credit card companies, utilities, and the transportation industry. “Pretexters” will request information from the companies by impersonating the client, usually over the phone.
Pretexting takes advantage of the vulnerability in identification techniques over the phone (or voice-only identification). When physical identification is impossible, companies must use other identification methods. This is useful for phone scams like what I just encountered. The key to getting the scam work is the victim believing the attacker is who they state.
Often, these alternate methods involve requesting verification of personal data, such as residence address, date of birth, maiden name, or account number. All this information can be obtained by the pretexter beforehand, either through social media websites or through “dumpster diving.”Although I do not know where Mr. Li got my information, it is compelling to ask for more. The more specific the knowledge a pretexter knows about you before they get in touch with you, the more valuable the information they can convince you to give up.Who is the person?What does this person want?How long is this encounter going to take?Is this person a threat?
If you immediately look back to your recent attempt to meet someone, these questions come up consciously or unconsciously. Social Engineers prepare all the answers beforehand to calm you and re-confirm the last question’s response (I am not a threat!).Back to my phone call yesterday, as an example, “Mr. Li” (according to what he told me) filled the blank:He is the customer service representative from the ICBC credit card call center.He wants me to inform me about the unsettled payment“A few minutes,” as he said at the beginning of the callHe was trying to help, so he cannot be a threat!When it comes to influencing, we tend to like people who like and understand us, and that is what Mr. Li good at. He tried several times to sell the problem I faced and proposed a solution for me with the remarks, “This is the best I can do FOR YOU.”I do appreciate Mr. Li’s attitude and his passionate voice. Empathy, after all, is the best selling tool. It is not something that unique to hackers but all the good salespeople and even parents. Using pre-staged empathy could help people implant ideas to the targets and reinforce the first encounter's non-threatening impression.
I keep telling customers to take care of the people pillar in the PPT framework as trust is always there if people are involved. A recent survey sponsored by CyberArk (a cybersecurity company), “,” showed a major shift in spear-phishing and impersonation attack patterns:
Extensive increases in credential theft attempts were reported for personal data (70%) and financial systems and data (66%). This is clear evidence of attackers’ interest in gaining “high-value” access to susceptible systems that users instead of administrators often hold.The most broadly reported group suffering increased attacks is end-users — including business users with sensitive data access. A majority of respondents (56%) report such end-users as being more targeted by attackers.Attacks are on the rise against senior leadership (48%), third-party vendors and contractors (39%), and DevOps and cloud engineers (33%).
One of the best ways to prevent pretexting is simply having the awareness that it’s conceivable and that techniques like email or phone spoofing can make it unclear who’s reaching out to contact you. Any security awareness training at the corporate level should include information on social engineering.
On a personal level, it’s necessary to be particularly cautious whenever anyone who has initiated contact with you begins asking for personal information. Remember, your bank already knows everything they need— they shouldn’t need you to tell them your account number.
When friends become enemies, we all started to wonder what’s wrong. And that quickly turns into the question of whether trust innately is the problem. Changing the attitude from “trust but verify” to “distrust and verify” requires finding out the most fundamental relationship, whether internal or external, to default-deny any request.
With the COVID-19 pandemic guiding an indefinite work-from-home lifestyle, zero-trust security has the ideal opportunity to become part of the standard security practice. With the proper understanding and approach, companies can modernize their infrastructure to include this more comprehensive protection, even if only beginning from a granular basis.If a pizza guy tries to follow you inside your office building (piggy-backing), tell them to call the person who ordered it to let them in. The pizza won’t get cold for delaying the delivery for only a few minutes.We should try our best not to expose and have the least privileged mindset at all times. Letting someone in a building without a good check and balance would inevitably create a hole in your fortress that is supposedly hard to penetrate.
Although using WeChat on cases may be the actual police investigation process in mainland China, I told him before hung up that he needs more training on pretexting and go back to work wondering how and who sold my data all day.
After I hung up, I search in multiple places to check if someone reporting the same phone scam. Eventually, I found out that I missed the best part of the play. There would be a scene where someone would hold a police batch in a photo or video call. Until next time, Mr. Li!Thank you for reading. May InfoSec be with you🖖.