We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4
Social Engineering for Security Attacks
Jennifer Nelson, X. Lin, C.
Chen, J. Iglesias and J. J. Li Computer Science, Kean University 1000 Morris Avenue, Union NJ 07083 USA 001-908-737-4262 {neljenni, juli}@kean.edu
ABSTRACT study how the attackers can take advantage of users’
Social Engineering is a kind of advance persistent threat (APT) vulnerabilities to carry out such types of attacks. that gains private and sensitive information through social The intention of social engineering attacks is to remain inside networks or other types of communication. The attackers can use the compromised accounts as long as possible to steal as much social engineering to obtain access into social network accounts data as possible. Such attacks are often well funded, organized, and stays there undetected for a long period of time. The purpose and sophisticated. Social engineering attackers usually target of the attack is to steal sensitive data and spread false information members of large organizations with high value information. rather than to cause direct damage. Such targets can include Financial industries, production companies, and the government Facebook accounts of government agencies, corporations, schools are examples of organizations that would be targeted. or high-profile users. We propose to use IDS, Intrusion Detection Social engineering attacks often use persuasive emails or System, to battle such attacks. What the social engineering does social network contacts to lure users to malicious sites for gaining is try to gain easy access, so that the attacks can be repeated and further information of the user and then use such information to ongoing. The focus of this study is to find out how this type of get into the user’s organization to steal information or cause attacks are carried out so that they can properly detected by IDS in further damages. future research.
Figure 2. An example spear phishing attack with social
engineering content. The social engineering content more often includes a link in the email or message. In fact malicious links are more common Figure 1. An example of social engineering attack using email than malicious files because such files might not get through or messaging. scanners. But there is no way to scan a link because scanning the content of a link would involving an action similar to clicking the link. Figure 3 shows an example of a fake link with a malicious This social engineering approach of knowing more fake login page pretending to be a paypal site to gain the victim’s information and tailor emails/messages to reflect such information paypal account authentication information. has raised the chances that the targeted user will open such email or message because it appears to be from a known source with legitimate content. Figure 1 diagram shows a spear phishing life cycle where the entire attack goes through a cycle starting from the email/message with content obtained through social engineering research. Once the victims fall into the social engineering trap, they will download the file or click the link, which gives the control and access of their systems to the attackers. The cycle includes 5 steps. First the attackers send a phishing email to the victims. When the victims get on a computer to receive the email, a piece of malware will be injected into the victims’ computers if they choose to click on a link or download a file. Once the malware is implanted into the victims’ computers, it will get into the storage space to steal sensitive information such as bank accounts and send it to the attackers. The malware can even cause further damage by getting into the router that the compromised computer connects to and gain control of the entire LAN managed by the router. It could even become a worm to attack other devices on the network. Spear phishing attacks taking adavantage of social engineering is infact quite common in our daily email and messaging communicaiton. We received three such attacks in this one month. Figure 2 shows a snapshot of such an attack we received on a social network account with a malicious file attachment. It shows that such an attack happens very frequently everywhere in the network. Figure 3. An example with spear phishing attack with social enginering content and mailicous links. 12. SET then prompts you to enter where you want to send 3.2 Attack Steps it from. Choose accordingly. In summary, we found that we can use the following steps to A spear phishing attacker researches specific organization carry out a social enginering attack using spear phishing. and high level employees. Using information obtained from social and corporate sites, an attacker can then create an email that 1. Attacker sends email/message with malware attachment or appears credible, part of social engineering. link to targeted user (organization). Once a spear phishing email/message’s link or attachment 2. User opens email/message because it appears to come from a has been downloaded or clicked, malware is installed on user’s trusted source and downloads attachment or clicks malicious computer. The malware then waits for attacker instructions. That link in email/message of a social network. attacker can now research the organization’s network. User sees 3. Targeted system has now been comprised because the document or views page while malware is running undetected. malicious content injects listeners or snipers into the Once key information is obtained, the attacker continues until data organization to which the victim belongs. is extracted. According to Trend Micro, about 94% of spear 4. The malicious code installs tools on the systems of the phishing emails/messages include attachments (Micro, 2012). The spear phishing emails/messages without attachments usually victim’s organization to be able to stay undetected until target international organizations or non-corporate organizations. confidential information is obtained. 5. Attacker is able to extract data continuously for a long period 4. WAYS TO PREVENT/REDUCE THE of time without being discovered. RISK OF SOCIAL ENGINEERING ATTACKS These steps can acutally be automated using tools provided We propose the following ways to reduce the risk of social by Kali Linux. This is a simple way we found for spear phishing engineering attacks: email to be sent. With an additional step of social enginering in gather user information throught social networks, we can use the 1) Use a firewall to limit access to your network. following simple steps to carry out spear phishing attacks in a a 2) Install comprehensive security on all your devices, like batch with a large group of emails and messages (2014). McAfee LiveSafe™ service, since malware is a key component in successful spear phishing attacks. 1. After installing Virtual Box/VMARE on you computer. You then to install Kali Linux. 3) Don’t click on attachments or links you receive from people you don’t know. 2. Once installed you go to Applications, Exploitation 4) Keep your personal information private, i.e. do not give Tools, then choose Social Engineering Toolkit, out too much information on social network. Be setoolkit. suspicious of anyone who asks for your home address, phone number, Social Security number, or other 3. Terminal screen appears where you choose the 1st personal identifying information. And, option Social-Engineering Attacks 5) Remember that once you share personal information 4. Next choose 1 for Spear-Phishing Attack Vectors and online it’s out of your control. Share cautiously on then Next you choose 2 for Create a FileFormat social network sites. Payload. 6) Check to see if the websites you share sensitive information with use two-factor authentication. This is a 5. Choose 4 for Microsoft Word RTF Fragments security technique that uses something that you know, MS10_87 such as your password, and something you possess, such as your phone, to verify your identity. For example, 6. Choose a payload, 5 for Windows Meterpreter your bank may ask for your password online, as well as Reverse_TCP(x64) a code that it has sent via text message to your phone. 7. You will then be prompted to enter a port number to This is a 2nd layer of protection and should be enabled listen on. 443 is the default port and requires no changes. for sensitive information. Malicious file is created. 8. Rename the File: so that the user can think it is The above steps outline ways to prevent the phishing attacks coming from a trusted source. carried out through social engineering. This approach tried to prevent attacks before their occurrence. In our other work, we 9. Create Email: You are then prompted to attack with tried to detect attacks when they occur. Such detection relies on single email address or mass mailer. Choose 1 for the monitoring of the network traffic to discover data patterns and Email-Attack Single Email Address. identify outliers as attack events. 10. SET: then prompts you to send using html or using Machine learning algorithms have often been used to classify plain text. HTML Is best so that it looks more authentic. data into categories such as attacks or normal traffic. The existing 11. You can then write your email. Once complete type Ctrl algorithms assume the existence of mathematical models and + C. work on certain types of data. We will use an approach as given in (Bassu 2012 [5]) to discover data patterns. We also study 6. ACKNOWLEDGMENTS improvement of some machine learning algorithms as reported in This research was partially supported through Kean (Rossikova 2016 [6]). University SpF 2015 Student Partnering with Faculty summer We hope our work will contribute to the field of social research program. The support of the Kean University Foundation engineering attack studies and help users decide what to share on and ORSP is greatly appreciated. social networks and their associated risks. Social network is a great form of communication which allows individual users to 7. REFERENCES communicate simultaneously with a large group of users. [1] How difficult is it to carry out an APT attack? (n.d.). However its security and the prevention of social engineers from Retrieved May 07, 2014, using information gathered form social network for attacks is an from http://www.cbronline.com/news/cybersecurity/data/ho important topic to study make social network a more popular and w-difficult-it-is-to-carry-out-an-atp-attack-4261415. safe place for communication. [2] Spear-phishing statistics from 2014-2015 - InfoSec Resources. (2015, August 19). Retrieved June 08, 2016, from 5. CONCLUSIONS http://resources.infosecinstitute.com/spear-phishing- Spear phishing emails/messages continue to be successful as statistics-from-2014-2015. cyber-attacks continue to become more sophisticated. It has been [3] Micro, T. (2012). Spear-Phishing Email: Most Favored APT estimated in 2015 that it takes 1 minute and 20 seconds for an Attack Bait. Trend Micro, http://www. trendmicro. com. employee in a company to open a phishing email/message au/cloud-content/us/pdfs/security-intelligence/white- (InfoSec Resources, 2015). They tend to take the bait quickly papers/wp-spear-phishing-email-most-favored-apt-attack- which leads to the lacking of time for detection system to run and bait. pdf (accessed 1 October 2014). to defend against phishing. Besides taking advantage of social engineering, it is the most commonly used form of an APT-type [4] "Hack Like a Pro: How to Spear Phish with the Social of attack. As long as emails/messages continue to be one of the Engineering Toolkit (SET) in BackTrack." Web log main forms of communications in most organization, such attacks post. WonderHowTo. N.p., 2104. Web. 8 June 2016. will continue and might be more successful along time with the <http://null-byte.wonderhowto.com/how-to/hack-like-pro- help of social engineering research. spear-phish-with-social-engineering-toolkit-set-backtrack- 0148571/>. Training should be conducted by all organizations to help reduce the risk of these attacks. Employee awareness can help [5] D.Bassu, R.Izmailov, A.McIntosh, L.Ness, D.Shallcross, reduce such attacks by a significant amount. Organization should “Centralized Multi--‐Scale Singular Vector Decomposition also research new ways of securing communication amongst high for Feature Construction in LIDAR Image Classification level employees who have access to confidential information. Problems”, Applied Imagery Pattern Recognition Workshop 2012. Intrusion detection system can also be used to detect such attacks once they are successful and with some impact to the [6] Y. Rossikova, J, J. Li and P. Morreale, “Intelligent Data target organization. Further study is ongoing on the ways to Mining for Translator Correctness Prediction”, prevent spear phishing attacks using social engineering and to CloudSecurity2016, Columbia unviersity NYC, April 2016. detect such attacks once they are successfully impacting the system with the changes to normal network and server traffic data and their patterns.