Combat Social Engineering: Don’t Be the Weakest Link

Smart criminals go after the 'lowest hanging fruit.'

September 16, 2010
/ PRINT / ShareShare / Text Size +

A ‘trusted vendor’ scenario

Using only basic information-gathering techniques, it’s not difficult to devise a plausible “trusted vendor” scenario that seems completely believable to an unsuspecting target.

For example, if a criminal’s intent was to covertly gain access to sensitive areas inside a financial institution, he might choose to pose as a pest inspector.

First, the social engineer would need to find out which pest control company the institution currently uses. Setting up surveillance outside a location waiting for the pest control technician to show up would take way too long. However, contacting the institution under the guise of a new pest control company looking to submit a competing bid might reveal the name of the current service provider.

If so, the next step would be to get the actual pest control company’s logo off the Internet to create a believable uniform using a “do-it-yourself” iron-on kit.

The social engineer could then use various social networks to find the names of some of the organization’s managers and, if lucky, the days those managers will be out on vacation. The criminal could then call the branch receptionist late in the day under the guise that the manager requested he come treat the office immediately.

The criminal could probably weave a convincing tale creating a sense of urgency, plus generate a reason for keeping staff members away while he’s “working.” One believable reason: Claim that management reported a rat infestation but wants to keep it secret to avoid alarming the rest of the staff.

Upon hearing that type of disturbing news, any possible suspicions about the pest control technician are probably replaced with anxiety over the nearby rat infestation. The criminal could further increase his chances of avoiding exposure by scheduling an after-hours appointment when he’d be free of prying eyes and have more time to snoop for sensitive information.

This scenario also offers a perfect opportunity to perform another favorite social engineering technique, dumpster diving, without raising suspicions. After all, who’s going to suspect a uniformed pest control technician is doing anything other than killing rats inside a dumpster?

You may think this is only a worst-case scenario, but companies that specialize in social engineering testing can attest that this type of situation happens with alarming frequency.

This example illustrates that, lacking adequate safeguards to combat social engineering threats, several weak links can exist along the security chain. It also demonstrates that strong policies and procedures, along with adequate training, can thwart the social engineer’s efforts.

Next: Reinforce the chain

Post a comment to this story

What's Popular

Popular Stories

Recent Discussion

Who Should Be the 2015 CU Hero of the Year?

View Results Poll Archive