Free Essay

Vut2 Task 1

In:

Submitted By saltywounds
Words 1020
Pages 5
To: Boss
From: Tiffany Valdes
Date: August 1, 2014
Subject: Recent Security Breach
Our company has recently been the victim of a social engineering attack that has resulted in a virus spreading through the corporate system. I believe this was accomplished by an advanced social engineering technique known as voice phishing or phishing, which usually utilizes email. An attacker contacted our offices in an attempt to gain sensitive data; this was done either by phone or email. However since company email is not known to the public it was more than likely done by phone. After contacting someone in our offices the attacker convinced that person to divulge one of our supervisors’ email addresses.
After the attacker gained this knowledge he or she had all the information needed to launch this attack. After creating a virus and injecting it into the email using a seemingly harmless looking link, to our corporate website no less. The attacker sent this to the supervisors email address. Once the supervisor opened the email and clicked on the link a virus was unleashed on the computer and spread through our system. This virus is causing all of our devices on the network to run terribly slow and has also recorded administrative usernames and passwords and passed this information on to the attacker. This information was used by the attacker to access confidential files on our system.
Furthermore, the email was sent from a fabricated address. So if we were to try to reply to the email to trace the email back to the owner to prosecute the offender it would be unsuccessful.
Ultimately I have concluded the following has taken place:
· An attacker mislead an employee and convinced him or her to release a supervisor’s email address.
· Using that address the attacker sent a malicious virus as an email attachment to said supervisor.
· After which the supervisor innocently clicked the link containing the virus.
· The virus then spread through our system accessing administrative usernames and passwords.
· The virus then somehow sent this information back to the attacker.
· The attacker then used this information to access sensitive files on our network.

Security Measures
After careful consideration I recommend the following security measures be implemented to prevent this from happening in the future. As a company we must initiate company wide security and awareness training for all of our employees, this will be paramount in preventing an attack such as this one in the future. This training must include how to handle situations that involve people trying to retrieve information about our company. Whether this is done by phone, email or in person we need to train our employees to be on guard for this and educate them on how to properly handle these situations without divulging company information. We also need to include training on physical security, this will involve educating our employees to be mindful when they are entering and exiting the building or secure areas. We need to all be aware of our surrounding and make sure we are not allowing unauthorized access to our company. Additionally, we must instruct our employees to not clink links or open attachments contained in emails unless they trust the source the email came from.
After properly training our staff we must also install antivirus on all of the devices on the network. These also must be set to auto-update, this way patches will be installed in a timely manner. This will also save the time of our I.T. department, as they would have to manually update each device every time a patch was released, wasting company resources. After cleaning these devices and installing the antivirus we will force all users, up to and including all administrators and upper management, to change their passwords
Lastly, we should audit our system in order to ensure our firewalls are properly configured and our users are granted privileges based on the rule of least privilege. Basically this will ensure no user has more rights to the system then they need to perform their duties.

Testing the Vulnerabilities
Subsequently we would need to test the effectiveness of the training regularly and randomly. This will involve many different social engineering techniques; I would recommend hiring an outside firm to complete this task. This way we would have an impartial assessment of how our employees handle the situations they are tested with. We would require this firm to test our employees in the following ways:
For the security guards/janitors:
· These employees would be tested mostly on the physical security of the business; we need to ensure these individuals are not susceptible to allowing unauthorized individuals into the building. This would involve in person social engineering techniques.
· Also we will ask them the following questions to determine if they would give out confidential information. o How often do you perform a security sweep? o What is the (insert department here) managers’ name, schedule, etc? o Is this building monitored 24/7?
For any employee that answers phone calls:
· For these employees we will perform a social engineering attack similar in nature to the one that breached our system. These employees will be tested by someone calling in and asking for confidential information.
· These questions are a sampling of what should be asked o What is (insert department here) managers’ email address? o Pretend to be from the internal I.T. department and ask for usernames, passwords, etc.
For all employee email accounts:
· In this attack phishing will be used to test the employees.
· Send a fake email containing fake malicious code, looking like a harmless link or attachment
· Send an email requesting confidential company information
This outside company will also conduct the following in order to test to see if they can obtain any corporate information.
· Dumpster diving
· Shoulder surfing
· Tailgating
After completing all of these tests we will have a better picture of where we stand, how effective our training is and also how we can improve upon on training techniques. As this will be an ongoing process, we must constantly learn and develop better techniques to protect our company.

Similar Documents

Free Essay

Vut2 Task 1

...To: Boss From: Brandon Moore Date: August 1, 2011 Subject: Social Engineering Attack on the Company Recently several of our user's have reported slowness of their computers. Not coincidentally, each of these users had also received a suspicious email reporting a problem with a particular item on the company website. This email contained a URL which, upon clicking, directed the user to a page in which nothing appeared out of the ordinary. It is my conclusion that both these events are intertwined and the users have contracted a computer virus, specifically a Trojan virus, which allows this attacker to gain access to the computer systems it infects. The attacker was able to accomplish this by manipulating our employees into believing they had a legitimate issue to raise with the company. Once they clicked on the link in the email, they were likely directed to a site that appeared to look the same as the company’s website, or they were sent to another site which downloaded the virus and were quickly redirected to a legitimate page before the user would ever notice. Additionally, the email address that contained the malicious URL had a “made-up” email address configured as the “Reply-To” so that when a user attempted to reply the email would not get anywhere. In conclusion, the actions that ultimately took place are as follows: ← User's received an email that appeared to be legitimate, but instead came from an attacker looking to gain access into...

Words: 1096 - Pages: 5

Premium Essay

Vut2-Rtft Task 1

...UVT2-RTFT Task 1 Competency 427.2.4: Advanced Social Engineering William J. Lawson MS Information Security & Assurance - 5/1/13 Student ID:000311942 My Mentor: Mary Gordon c: 317-448-3045 Indianapolis, IN - Eastern Time wlawson@my.wgu.edu[->0] A. Create a memo discussing how you believe the intruder gained access to the company's network using social engineering. Incident Memo to Management Recently The Company was a victim of a Social Engineering (SE) attack, perpetrated by an unknown entity. Social Engineering is a method used by confidence men (con-men) to acquire information through human interaction that will be used to support a cyber attack. It often involves some form of trickery. In this case a supervisor assigned to handle customer complaints received an email from a suspected customer claiming that one of the products listed on the website was incorrect. The email also included a URL to the web page in question. I suspect that the attacker acquired the Supervisor's email address by first contacting the customer support desk and posing as disgruntled customer. Once the customer (attacker) stated his/her complaint to the employee and the employee responded the customer pretended that he was not satisfied and stated to the employee that his complaint was not completely satisfied. He then asked the employee for the supervisor's name, and contact information. In order to satisfy the customer the employee provides the...

Words: 1996 - Pages: 8

Premium Essay

Vut2 Task 1 Memo Checklist

...TO: FROM: SUBJECT: DATE: CC: METHOD OF INTRUSION After gathering much information from the supervisor who received the original email in question, as well as events having occurred with immediate subsequence, it seems highly evident that the method of intrusion was a result of spear phishing campaign, which typically involves sending a seemingly genuine email containing a seemingly genuine link. However, the email, while pretending to be from a friendly (“recognizable” or “valid” or “authorized”) individual, but is far from that. The link is very malicious, designed to redirect (cause the web browser to go to an unintended/unwanted/ unknown/undesired web page) a person’s web browser to a webpage that is (phony and) malicious in nature, seeking only to execute commands that are for clandestine purposes. The typical outcome involves installation of some form of malware (keylogger, virus, trojan, browser hijacker, remote access backdoor, network and password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in mind the user clicked on the link). In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user name and password, but also trolled through network activity to obtain potential accounts (username and password) that would have higher level administrative permissions...

Words: 1895 - Pages: 8

Premium Essay

Vulnrability Assessment

...VUT2- Vulnerability Assessment Task 1 2012 VUT2- Vulnerability Assessment Task 1 2012 Introduction Social Engineering is the means of acquiring information by deceiving and tricking the human element of an information system. Hackers know that people are the weak link in any Information System. Attackers trick users into revealing valuable information and coerce users into performing tasks that may cause harm to their organization. The social engineering attack can be broken down into two logical stages; the physical settings and psychological methods stages. Physical settings stage would gather information by accessing the work place using impersonation, telephone calls, online chat, or email contact. Attackers then use this information against the organization during the psychological methods stage. (Jones, 2003). In this scenario a supervisor that handles customer complaints received an email that one of the product listings on the organization’s website was incorrect. The link provided in the email redirected the user to a page containing a script, that once run, compromised the supervisor’s computer by downloading and installing a Trojan horse and opening a remote access session for the attacker which allowed him to access and downloaded confidential files from the system. During the first stage, the attacker impersonated a customer from account information perhaps discovered during a reconnaissance attack in the form of dumpster diving in the organization’s...

Words: 1821 - Pages: 8