
Want to listen instead?
As Chet explains it, social engineering is what our moms used to call fibbing. At its best, it’s good lying.At Defcon, they have a social engineering contest. They put contenders in a soundproof booth and get them to call random companies to see if they can convince victims to let them social engineer their way into their networks.
“In essence, it’s someone convincing you to help them do something that’s against your interest,” he notes. “There was one woman making the calls with an audio tape of a crying baby in the background to add stress to the call, and that’s the kind of thing hackers will do.”One convention had somebody go around with a camera and a microphone asking questions, but the questions were all security questions.
“Everybody I’ve talked to about the authority principle likes to think they wouldn’t fall for it. All of us are wrong,” Derik contends. “Even if you’re aware of the scam, it can still get you if the timing and the placing are right.” “One of my favorite stories on the mindset of Authority was about a British soldier in World War II. With just a saber, he got 42 German soldiers with rifles to surrender to him. Just him. His superiors asked him how. He said if you walk up to any German and tell them to surrender with enough authority, they’ll put their guns down and listen.”The evolving capability of deep fakes allows that authority to be borrowed more easily. IT professionals are starting to see thread hijacking happening in real conversations. Cybercriminals will compromise an email account and hijack an existing conversation between you and your boss. They respond as your boss with a malicious attachment, saying something like, “There’s been a change of plans. We’ve had to update the budget. Check the spreadsheet.” “It’s almost impossible to detect,” Chet notes. “If it were a random email from somebody in finance I’d never heard of, I’d probably be suspicious. When it’s somebody in a position of authority that I’m familiar with, I’d trust that. “
“The tipoff that it is a scam is that you’ve called a phone number at a major American tech company and reached a human,” Chet says. “Try talking to any human being at Amazon or Google or Facebook or any of these companies that are being impersonated. But if it’s a scam, you always get a human right away, and that’s your tip-off.”We need to create technical systems that prevent these things rather than counting on users to spot them because it’s just too hard. How many domain names are associated with your company? If you use Office 365, you’ll see 30 or 40 different domain names show up in links you get from Teams, Office, Word, Outlook, One Drive, etc. How would Chet teach users which ones are legit? He notes that it’s hopeless to try to teach 5,000 people that http://microsoft.com is good, but http://demand.msft.com is bad. Mistakes are going to happen. Teaching employees to be aware of potential scams is useful. Teaching them to look at a URL and magically understand what it means when it’s designed for a computer, not for a human brain, is crazy. There’s a balance, and the balance is keeping scam awareness in people’s minds. Chet advocates refreshing that training every quarter and supplying pertinent examples, especially ones that have been sent to your executives or staff members. Training helps eliminate some of the less sophisticated stuff. Also, create a culture where there is no shame in employees asking a question or reporting that they’ve clicked on something they shouldn’t have. If they are targeting multiple people within your organization, reporting it might prevent others from taking the same action. With Office 365 and Gmail tools, you can search for those messages across your organization and delete them or alert users.
“People need to understand that if they fall for something and report it as quickly as possible, it can be a positive thing,” Derik adds. “No good company will fire you because you fell for something once. If they did, congratulations; you got away from a toxic organization. Now, if you’re the CFO and you’ve sent the prince of Dubai money, then maybe you might want to be worried about your position.”Also, never underestimate an incentive, he notes. “A $50 Amazon gift card is the best $50 your IT team ever spent if it’s a raffle for people who report a security issue. It reinforces a positive thing – that you contribute when doing this. You’re not annoying us. You’re helping us. People like to compete, they like to win things, and it’s a good way to positively reinforce security messaging rather than negatively.” This article was written from one of our podcast episodes on Between The Bytes! To learn more about protecting you and your business from cybersecurity threats, check out our Ultimate Guide To Cybersecurity!