Social Engineering and Identity Theft

28
©2011 Gogo Inc. and Affiliates. Proprietary & Confidential. Social Engineering and Identity Theft How to avoid being a victim Scott Teipe – CISSP, CISM Manager of Information Security

Transcript of Social Engineering and Identity Theft

Page 1: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.

Social Engineering and Identity Theft How to avoid being a

victim

Scott Teipe – CISSP, CISMManager of Information Security

Page 2: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.2

Social Engineering and Identity Theft Cases

Frank Abagnale (1969)– http://en.wikipedia.org/wiki/Frank_Abagnale

Lifelock (2007)– http://en.wikipedia.org/wiki/Lifelock

HBGary vs. Anonymous (2011)

– http://en.wikipedia.org/wiki/HBGary

Amar Singh (2012)– http://www.huffingtonpost.com/2012/08/07/largest-id-theft

-in-history_n_1751241.html

Page 3: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.3

Identity Theft Statistics• One of the most common cybercrimes

worldwide!

The 2013 Identity Fraud Report released by Javelin Strategy & Research indicates:

In 2012 identity fraud incidents increased by more than one million victims.

Fraudsters stole more than $21 billion, the highest amount since 2009.

12.6 million victims in the United States in 2012.

1 new victim every 3 seconds!!!

Page 4: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.4

Identity Theft

Javelin Strategy & Research Reporthttps://www.javelinstrategy.com/news/1387/92/More-Than-12-Million-Identity-Fraud-Victims-in-2012-According-to-Latest-Javelin-Strategy-Research-Report/d,pressRoomDetail

Page 5: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.5

Identity Theft

Once your personal data is obtained, it can be used to:

• Apply for a job• Charge utilities• File for bankruptcy• File fraudulent tax returns• Open new accounts on your name• Commit a crime or get into legal trouble• Drain your checking account and savings• Go on a spending spree, purchase a car, appliances,

services, etc.

Page 6: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.6

Social Engineering• Social Engineering - New term for

an old problem: being scammed.• Exploit Human Nature Weakness

– Desire to Help– Fear of Authority– Use of logic(mask a small lie within

a series of true statements)– Exploit necessities and desires

(money, sex, free services/entertainment, etc.)

• Technical and Non Technical– Phone, email, trash, face to face– Target: Your personal information or

third party information for which you have access.

Page 7: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.7

Social Engineering Techniques• Phishing and Spearphishing• Dumpster Diving

– Be aware of what you throw in the trash. Someone’s trash is someone else’s treasure.

• Shoulder surfing– Always check to ensure nobody is peeking over your

shoulder when entering security credentials (PIN, Password, etc)

Some of these techniques allow the attacker to bypass security controls (passwords, firewalls, etc)

Page 8: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.8

Scenario 1• You find a USB key in the parking lot at your

workplace, once you plug it in, you find a program that offer free access to a website in order to watch pirated first-run movies.

Page 9: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.9

Scenario 2• You work in IT support and receive a phone call. The

person on the other side of the line claims to be the new VP of the company and has forgotten his/her security credentials (pin/password) and asks you to reset their password.

Page 10: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.10

Strategy• Awareness and Common

Sense– If its too good to be true…

• Discipline and Education• If in doubt, look for

confirmation• Efficient use of defensive

technologies• Proper use, storage and

disposal of your information

Page 11: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.11

Technology Defense Mechanisms• Security in depth: Multiple overlapping defenses

– Remember there is no single solution that protects 100% against an attack

• Proactive vs. Reactive • Firewall, Antivirus, System Patches • Most Modern operating systems have user friendly

security features built-in• Passwords security• Data disposal

Page 12: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.12

Action Center• Windows 7/8

– Antivirus: • Win8: Windows Defender• Win7: Windows security essentials

– Firewall: Windows Firewall– Patch Management: Windows Update– Other features:

• Data Privacy/Protection (BitLocker Win7/8)• Antiphishing (Win8 Windows SmartScreen)• Family Safety (Win 8)

Page 13: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.13

Action Center• Display Important messages• Windows update: Make sure Windows Update is

configured correctly and turned on!

Page 14: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.14

Windows Defender

• Antivirus Real time protection

• Status color coded: Green, Yellow, Red

Page 15: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.15

Windows Smart Screen

• Real time protection against malware

• Offers phishing protection within IE in real time.

Page 16: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.16

Password Security• Length: 16 or more characters• Complexity

– Avoid Dictionary words and personally identifiable information

– Change the order - use numbers, symbols then letters.• Human nature is to use a capital letter then lower case

then numbers and symbols to form a password. Hacking programs know this!

– Use password generators• https://www.grc.com/passwords.htm• http://passwordsgenerator.net/

• Too many passwords? Try a password manager• Free Password Manager – Keepass

– http://keepass.info/

Page 17: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.17

Two Factor Authentication• Offers an extra layer of security• It requires an additional

authentication factor• One of the following besides

username and password:– Something you have: Security

token– Something you know: PIN or

pattern– Something you are: Biometrics

like fingerprint, voice, etc• Google and Yahoo started offering

two factor authentication as an additional security feature back in 2011.

Page 18: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.18

Digital Fingerprints• Where we are leaving traces

of our lives:– Social Media (Twitter,

Facebook, LinkedIN, etc)– Old Devices: Cellphones

• What are we leaving behind:– Date/Place of birth– Family Members

Information (Nicknames/Dates/etc)

– Social Security Numbers, Phone Numbers, etc.

Page 19: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.19

How to Manage Your Information• Install a data sanitation

utility and use it to delete any important and/or personal information.

• If you are going to sell/transfer a device wipe the storage device clean including the memory card!

• Another excellent protection is to encrypt your sensitive information.

Page 20: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.20

Free Tools for Secure Erase• Eraser

– http://eraser.heidi.ie/download.php• Ccleaner

– http://www.piriform.com/ccleaner/download• File Shredder

– http://www.fileshredder.org/

Page 21: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.21

Free Tools for Data Wipe• Secure Erase

– http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml• MHDD

– http://hddguru.com/software/2005.10.02-MHDD/• Hard disk vendors offer utilities to wipe the contents of their

HD• Always wipe the Hard disk before disposing or donating an old

computer!!!• Don’t become a victim of old personal data.

Page 22: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.22

Free Tools for Data Encryption• Truecrypt

– http://www.truecrypt.org/• Safehouse Explorer Encryption

– http://www.safehousesoftware.com/• Windows 7/8 Bitlocker

– http://windows.microsoft.com/en-hk/windows7/products/features/bitlocker

Encrypt data on removable storage (USB thumb drives, SD cards)

Page 23: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.23

Free Anti-virus– Avast:

http://www.avast.com/index

– AVG: http://free.avg.com/ww-en/homepage

– Avira: http://www.avira.com/en/avira-free-antivirus

Page 24: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.24

Email

Basic principles– Avoid clicking on links contained within e-mail

messages.– Type the webpage into the browser instead of clicking

on the link.– If in doubt, confirm the validity of the e-mail with the

sender.

WHY???– It is very easy for hackers to forge the sender’s

identity.– It is easy to forge the e-mail format to make it look

legitimate.– Clicking on a legitimate looking link may install

malicious software without your consent or knowledge.

Page 25: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.25

Email

No official UN or HSBC email addresses

Take a look to the header

Page 26: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.26

Internet Browsing• Most vulnerabilities require you to click on

something within the website to activate the vulnerability and cause your computer to crash or become very slow.

• Websites make it difficult to choose the right place to click. Often times, buttons are just images coaxing you to perform an action such as clicking on a link embedded in an image.

• Critical: keep your browser and computer updated with the latest versions and patches!!!

Page 27: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.27

Conclusions• Be aware, educated and

disciplined.• Keep it simple (i.e: Just

install the applications that you really need).

• There are no silver bullets, having a strategy in conjunction with the proper use of technology will help you to minimize your exposure to fraud.

Page 28: Social Engineering and Identity Theft

©2011 Gogo Inc. and Affiliates. Proprietary & Confidential.28

Questions??