Free Essay

Vut2 Task 1

In:

Submitted By jay320
Words 1096
Pages 5
To: Boss

From: Brandon Moore

Date: August 1, 2011

Subject: Social Engineering Attack on the Company

Recently several of our user's have reported slowness of their computers. Not coincidentally, each of these users had also received a suspicious email reporting a problem with a particular item on the company website. This email contained a URL which, upon clicking, directed the user to a page in which nothing appeared out of the ordinary.

It is my conclusion that both these events are intertwined and the users have contracted a computer virus, specifically a Trojan virus, which allows this attacker to gain access to the computer systems it infects.

The attacker was able to accomplish this by manipulating our employees into believing they had a legitimate issue to raise with the company. Once they clicked on the link in the email, they were likely directed to a site that appeared to look the same as the company’s website, or they were sent to another site which downloaded the virus and were quickly redirected to a legitimate page before the user would ever notice.

Additionally, the email address that contained the malicious URL had a “made-up” email address configured as the “Reply-To” so that when a user attempted to reply the email would not get anywhere.

In conclusion, the actions that ultimately took place are as follows: ← User's received an email that appeared to be legitimate, but instead came from an attacker looking to gain access into the company's network. ← The link contained in the email that was clicked on was the main factor in these computers contracting the virus. ← The virus is likely a Trojan which means the attacker likely has access to the machines and the data on them. ← The “Reply-To” address is not an email address that exists to any person or machine.

Security Recommendations

In response to this attack, it would be wise to evaluate how this attack occurred and what actions can be taken to prevent another similar attack from happening again. After personally reviewing the facts of the matter I have derived some recommendations that would aid in accomplishing the goal of preventing future incidents.

First and foremost there needs to be an information security awareness training session performed regularly within the company. The training should include when to question an email they receive, a stranger they see around the building, and phone calls they receive. The training should include tips to detect an impersonation attempt. Calling back a company or entity on a published phone line to verify the identity of a stranger posing as a contractor, contacting a manager when a stranger is claiming to work with the organization, and not clicking on any URL's from bizarre emails would be some examples to combat impersonation.

Second, an intrusion detection system(IDS) should be installed on the network. An IDS can be configured to look for anomalies in network traffic. This particular case likely involved data being transmitted to the attacker or the attacker may have even gained remote access. Since this would be considered “out of the norm” an IDS would send an alert which could be inspected further. Although an attacker may have gained access to the network or data, such activity could be shut down sooner than later.

Third, users should only access their computer on a limited user account. This method would allow sensitive data to be encrypted with only Administrator access. If a user does get a virus that virus will only be subject to the users limited access and not have default access to encrypted files.

Lastly, each user should have an anti-virus installed and forced to update automatically. Although a virus, and particularly the Trojan involved in the attack in question, can change it's signature to reduce detection by an anti-virus an anti-virus does add a last line of defense before infection.

Auditing the Social Engineering Vulnerability

The above security measures would be additionally complimented with the use of a regularly scheduled audit of an individuals access to sensitive data and the network via social engineering means. This would be an audit much unlike any other in that it would be the testing of the employee's responses to queries from strangers. As an employee of the company I would not be a candidate to perform this type of audit, thus I would seek out a professional security consultant capable of thoroughly auditing the company in this manner.

To begin with, I would ask this contracted security consultant firm to perform the following tasks: ← Determine if employees are vulnerable to an impersonation or or any other social engineering attacks including, but not limited to phishing, pretexting, or quid pro quo attacks. ← Test physical security to all areas of the company's building and specifically noting potential flaws where attackers could take advantage of. ← Collect data from third sites like Google Newsgroups to determine if any sensitive data is available that would aid in an attack on the company. ← Conduct an after hours access test to determine if access can be granted outside of normal business hours. ← Finally, in any situation where some level of access is granted to the auditors those auditors should look for ways in which they can gather passwords or other useful data to an attacker, and areas that are vulnerable to devices being placed on the network to facilitate an attack.

As the audit is performed, any data gathered should be used by the auditor to further their access into unauthorized areas. For example, as names of employees, expected shipments, or scheduled maintenance work is discovered the auditor should use this information to gain access. In addition, no employee should be excluded as a possible target of a social engineering attack in the above manner.

A second type of social engineering attack that cannot be performed by a stranger would be that of an employee looking to obtain greater access to perform malicious activities. This type of attack would be one that myself, an employee of the company, would perform with written approval. The reason being that having a familiar face and being known as a fellow employee would yield different social engineering opportunities than that of a stranger.

The audit performed in this manner would need to include the following techniques: ← Shoulder surfing ← Tailgating ← Phishing for technical help from other users and asking for passwords to assist in resolving technical issues. ← Gaining access to unlocked computers. This can be achieved by directing people away from their machines using scenarios like donuts in the break room.

Similar Documents

Free Essay

Vut2 Task 1

...To: Boss From: Tiffany Valdes Date: August 1, 2014 Subject: Recent Security Breach Our company has recently been the victim of a social engineering attack that has resulted in a virus spreading through the corporate system. I believe this was accomplished by an advanced social engineering technique known as voice phishing or phishing, which usually utilizes email. An attacker contacted our offices in an attempt to gain sensitive data; this was done either by phone or email. However since company email is not known to the public it was more than likely done by phone. After contacting someone in our offices the attacker convinced that person to divulge one of our supervisors’ email addresses. After the attacker gained this knowledge he or she had all the information needed to launch this attack. After creating a virus and injecting it into the email using a seemingly harmless looking link, to our corporate website no less. The attacker sent this to the supervisors email address. Once the supervisor opened the email and clicked on the link a virus was unleashed on the computer and spread through our system. This virus is causing all of our devices on the network to run terribly slow and has also recorded administrative usernames and passwords and passed this information on to the attacker. This information was used by the attacker to access confidential files on our system. Furthermore, the email was sent from a fabricated address. So if we were to try to reply to the email...

Words: 1020 - Pages: 5

Premium Essay

Vut2-Rtft Task 1

...UVT2-RTFT Task 1 Competency 427.2.4: Advanced Social Engineering William J. Lawson MS Information Security & Assurance - 5/1/13 Student ID:000311942 My Mentor: Mary Gordon c: 317-448-3045 Indianapolis, IN - Eastern Time wlawson@my.wgu.edu[->0] A. Create a memo discussing how you believe the intruder gained access to the company's network using social engineering. Incident Memo to Management Recently The Company was a victim of a Social Engineering (SE) attack, perpetrated by an unknown entity. Social Engineering is a method used by confidence men (con-men) to acquire information through human interaction that will be used to support a cyber attack. It often involves some form of trickery. In this case a supervisor assigned to handle customer complaints received an email from a suspected customer claiming that one of the products listed on the website was incorrect. The email also included a URL to the web page in question. I suspect that the attacker acquired the Supervisor's email address by first contacting the customer support desk and posing as disgruntled customer. Once the customer (attacker) stated his/her complaint to the employee and the employee responded the customer pretended that he was not satisfied and stated to the employee that his complaint was not completely satisfied. He then asked the employee for the supervisor's name, and contact information. In order to satisfy the customer the employee provides the...

Words: 1996 - Pages: 8

Premium Essay

Vut2 Task 1 Memo Checklist

...TO: FROM: SUBJECT: DATE: CC: METHOD OF INTRUSION After gathering much information from the supervisor who received the original email in question, as well as events having occurred with immediate subsequence, it seems highly evident that the method of intrusion was a result of spear phishing campaign, which typically involves sending a seemingly genuine email containing a seemingly genuine link. However, the email, while pretending to be from a friendly (“recognizable” or “valid” or “authorized”) individual, but is far from that. The link is very malicious, designed to redirect (cause the web browser to go to an unintended/unwanted/ unknown/undesired web page) a person’s web browser to a webpage that is (phony and) malicious in nature, seeking only to execute commands that are for clandestine purposes. The typical outcome involves installation of some form of malware (keylogger, virus, trojan, browser hijacker, remote access backdoor, network and password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in mind the user clicked on the link). In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user name and password, but also trolled through network activity to obtain potential accounts (username and password) that would have higher level administrative permissions...

Words: 1895 - Pages: 8

Premium Essay

Vulnrability Assessment

...VUT2- Vulnerability Assessment Task 1 2012 VUT2- Vulnerability Assessment Task 1 2012 Introduction Social Engineering is the means of acquiring information by deceiving and tricking the human element of an information system. Hackers know that people are the weak link in any Information System. Attackers trick users into revealing valuable information and coerce users into performing tasks that may cause harm to their organization. The social engineering attack can be broken down into two logical stages; the physical settings and psychological methods stages. Physical settings stage would gather information by accessing the work place using impersonation, telephone calls, online chat, or email contact. Attackers then use this information against the organization during the psychological methods stage. (Jones, 2003). In this scenario a supervisor that handles customer complaints received an email that one of the product listings on the organization’s website was incorrect. The link provided in the email redirected the user to a page containing a script, that once run, compromised the supervisor’s computer by downloading and installing a Trojan horse and opening a remote access session for the attacker which allowed him to access and downloaded confidential files from the system. During the first stage, the attacker impersonated a customer from account information perhaps discovered during a reconnaissance attack in the form of dumpster diving in the organization’s...

Words: 1821 - Pages: 8