Thursday, November 3, 2011

Social Engineering : Always part of a full pentest


I've really been MIA with too much travel, and family obligations. I'm definitely going to be posting more frequently going forward.
As I process conversations had during an interview with my friends at social-engineer.org, it got me thinking that I need to write a little blurb about SE, and its value in the grand scheme of security assessments.

We'll start with the basics; wiki defines social engineering as the art of making people give out their confidential information. "Social engineering" is more precisely: the act of psychological manipulation. So a little about the elements that SE is comprised of.

Persuasion:
is all about like it sounds persuading the victim to willingly give you "the attacker" the information you are after. This can take many forms, however an easy example would be calling a victim and informing them that you are the new help desk temp and wanted to make sure that their computer was updated, they just have to provide you with the user name and password so you can check.

Phishing:
this is about cloning a legitimate authentication interface and making users enter credentials or other personal information you may be interested in, in the cloned page versus the legitimate. An example would be cloning the facebook.com and getting a user to enter credentials assuming your clone is actually facebook.com and thus providing you "the attacker" with a copy of the used credentials.
Apart from webpages, there is also phone, and email phishing attacks, commonly used in most multi-vector SE attacks.

Baiting: A baiting scenario can be where malicious auto run software is placed on thumb drives and lets say the attacker stands in front of a corporate building with a sign that says "employee appreciation please take 1." When the drives are plugged in they install or run malware such as a key logger with phone home capabilities.

Physical: Physical is the in person manipulation of the natural human tendency to trust. An example would be if there is a badge access only door to a building, and you show up during a busy time when people are frequently entering through that door, with a box of donuts, your brief case while on the phone, and getting someone in front of you to hold the door for your because "your hands are full"

These are a few of the most commonly used social engineering attacks and so with just that small glimpse into what doors social engineering can open, its astonishing that many organizations still conduct full security assessments and opt not to have the SE / Physical security tested.
Social engineering is an initial attack vector that can not only circumvent technological controls, but also be the initial phase in what may escalate into a full blown multi-vector attack.
If organizations are going to do complete or full penetration tests, and assessment there should be no reason to exclude SE and Physical. The value comes having a more holistic understanding of your security posture, threats, and associated mitigations. Funding spent on beefing up only technological security is money well spent of course, how ever it may be a wasted investment is an individual can walk into your facility unplug the device and just physically remove it from the premises.

I will be posting the www.social-engineering.org podcast as soon as its available.



Tuesday, January 18, 2011

The Return of Koobface


Haven't blogged in a while, but as the nostalgia wears off and I settle into 2011 figured I would write up a quick post that alot of you might find benefit from. Some of you may have heard of KOOBFACE before and it looks like the infamous worm has made a return. The new campaign is spreading primarily on Facebook at this point but a jump to twitter is sure to follow in hours and days ahead. A change from it's predecessor, the new campaign is spreading via direct messages sent from compromised accounts rather than the wall posting of links as done before. Additionally this new variant uses alot of obfuscation in the links that are being sent, and they redirect the victim to a site that has the visitor install the payload via a "missing Flash plug-in"
For readers not familiar with KoobFace, some details about it as per the team at Symantec
Originally Discovered: August 3, 2008

W32.Koobface is a worm that spreads through social networking sites. W32.Koobface, an anagram of Facebook, is a worm that spreads primarily through social networking sites (hence the name) and uses compromised computers to build a peer-to-peer botnet. A compromised computer contacts other compromised computers to receive commands in a peer-to-peer fashion. The botnet is used to install additional pay-per-install malware on the compromised computer as well as hijack search queries to display advertisements.

Infection
W32.Koobface spreads primarily through social networking sites as links to videos. When a user visits the website that is hosting the video, they are prompted to download a video codec or other necessary update, which is actually a copy of the worm.

The popularity of social networking sites is the key to W32.Koobface's ability to spread. By targeting social networking sites, the worm uses social engineering techniques to spread. Users of social networking sites can often be tricked into thinking that a link that has supposedly been posted by a friend or acquaintance is safe. Users may have difficulty determining if a link was posted by a friend or the worm.


Functionality
W32.Koobface builds a peer-to-peer botnet and it is used to install additional pay-per-install malware on the compromised computer as well as hijack search queries to display advertisements. Compromised computers contact other compromised computers to receive commands in a peer-to-peer fashion.

The worm is able to perform the following functions:
  • Spread through social networks
  • Steal confidential information
  • Inject advertising into web browsers
  • Redirect web browsing to malicious sites
  • Intercept Internet traffic
  • Block access to certain Internet sites
  • Start a web server to serve as a command and control server for other Koobface infections
  • Download additional files, such as updates to itself and other pay-per-install software that includes fake security products
  • Steal software license keys
  • Break CAPTCHAs
  • Determine if a link is blocked by Facebook
  • Create new Blogspot accounts and pages
  • Modify the Hosts file