I hate to be the one to continually complain about security, but that doesn’t mean I won’t keep doing it. I would estimate that 95% of people are FAR too lax when it comes to security measures, and that another 4% are just plain old lax.
This latest story focuses on a concept called social engineering as a weak link in the chain (among other issues). Social engineering is the process of causing a security breach through submersive human interaction - in this case fooling bank personnel into believing you are someone you are not.The full story can be found here. These are the pertinent excerpts:
Banking on Security
Our first step was to select a vendor to impersonate. To keep the suspicion level down, it needed to be someone who’d use a computer or laptop once inside. To find out more, I sent a colleague into the bank to inquire about a checking account. While in the bank she took notice of the various pieces of office equipment, specifically the printers, faxes, and copiers.…After reviewing the list of office equipment she retrieved, we decided the best person to enter the facility was a copier technician.…On the day we planned to go in, I called the bank and indicated I was new to the copier company and wanted to get familiar with the machine to properly service the equipment. I indicated we could perform a preventive maintenance call at no charge to insure the quality of the prints and copies. The person at the bank agreed and thought it was a good idea.…I entered the bank lobby and was immediately greeted by a woman in a small glass-paneled workspace. I mentioned we called earlier, dropped the contact’s name, and indicated I was here to service the copier/printer. Without hesitation I was escorted to the machine and left unattended. To make it appear as if I were working on the device, I opened every panel on the machine, pulled all the trays out, and placed my laptop on the glass surface of the copier/printer.
I was approached by a few people who needed to make copies, I apologized for the inconvenience and said the machine might be down for 30-40 minutes. I then disconnected the network cable from the copier/printer and attached my laptop. As soon as my laptop booted up, DHCP provided a network address and I was on the internal network. I started a few of our utilities and started sniffing the traffic on the network.
Within seconds I had a variety of logins and passwords, access to numerous shared folders, data, and administrative accounts.…When I returned to my office I immediately called my contact and explained what we did and that we were successful. After retrieving the ream of paper with his password, I could hear the concern in his voice since our job confirmed his worst fears. I explained to him this type of problem can be fixed by sharing the results with his employees, and that no one person should be targeted as a single point of failure.
The good news is that the bank in this story actually hired these pros to come in and do this testing for them. That gives them the opportunity to try to plug these security holes. The bad news is that the security breach in this case is so simple that I could grab my laptop and go duplicate the attack tomorrow without any special tools or additional software.
The moral to this story is that in your business you need to be constantly vigilant and in your private life you need to be paranoid about what types of information to allow people access to.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment