Student Guide and Problem Statement

advertisement

Social Engineering: Online Financial Management

Problem Statement & Student Guide

Version 3: 24 th November 2015

Scenario

This scenario is based on a real attack that is provided by Ian Mann (2013, pp73-86 by agreement). I strongly recommend his (very readable) books, they provide an excellent insight into social engineering in a commercial setting.

You are the understaffed security team for EdgeCoin PLC, a web based financial organisation located in the North West England.

EdgeCoin PLC offers an “EdgeWallet” account based in its own proprietary Crypto Currency.

Services include UK based account transfer, exchange with other crypto currencies and acceptance of international wires from the established banking industry.

The board of directors for EdgeCoin PLC have stated that they aim to offer maximum security for their customers and aim to minimise and disrupt the facilitation of fraudulent payments or currency trading through their systems.

EdgeCoin provides a system to enable their customers to manage financial investments online.

There is a telephone help desk.

The board of EdgeCoin have become increasingly aware of social engineering attacks, including phishing and attempts to gain customer information via the helpdesk. The board has contracted you to help them.

Learning Outcomes

On completion of the scenario, students will be able to:

1.

Define the term Social Engineering

2.

Explain current Social Engineering threat vectors, how they exploit human vulnerabilities and their extent and impact.

3.

Explain and Justify appropriate controls.

Task 1: Establishing the risk of Social engineering

The Board has contracted you to provide a concise report which identifies the scale and current landscape of social engineering threats, particularly in the area of financial services. You should also provide information about how social engineers plan their attacks.

You need to explore the current state of Social engineering attacks, identifying threats, the human vulnerabilities that they exploit and their relative frequency. Given that this report is for the board of directors, how would you structure it? You will also need to deliver it to the board as a PowerPoint presentation.

Task 2: Planning the Social Engineering attack.

The Board has also asked you to test their resilience to Social engineering and have asked you to conduct a social engineering penetration test to evaluate the effectiveness of their current controls.

1

The brief for the Social Engineer is to obtain a password reset for a sample of users. The users are the executives of selected customers of the EdgeCoin. The only information provided is the names of the customer organisation and the senior executives to be impersonated.

What would you do?

There are primarily two strategies: either target the customers or target the helpdesk. a) How might you target the customers? b) How might you target the helpdesk?

Task 3: How do you find the following authentication information?

This is where you have to be creative: Think about where the information is kept, how confidential it would be regarded and then how to go about obtaining it. What other locations might provide some of this information? How could you use status to attempt to get the help desk to release information? a) Date of Birth – remember the customers are executives of UK companies. b) Account number c) Mother’s maiden name

Task 4: How would you improve the system?

Finally, after the successful attack, you need to identify actions that the company should take to address the vulnerabilities that have been identified.

Reflection on Learning

It is also important that at the end of the scenario you should reflect on your learning and team working and identify what worked well, what didn’t and actions for future improvement.

The Consulting Process

One of the benefits of Problem-based Learning is that you learn professional skills as well as technical knowledge. The process we ask you to follow to explore and provide solutions to the problem also mirror those used in consultancy.

In order to assist you with the process, the following table shows the activities we would expect you to complete in your PBL team. You should read this carefully and make sure you are familiar with both the generic activities (in column 2) and the specific ones in column 3.

Steps 1 & 2 will be conducted in the first PBL tutorial.

Step 3 a) and b) comprises your individual research, and summarizing your learning.

Step 3 c) takes place as a sharing and teaching session at the next tutorial. This process of sharing and teaching others is extremely beneficial to your own learning.

Step 4, 5, 6 consist of team work and whilst they are logically distinct, they may take place at the same meeting as stage 3c) depending on the schedule of meetings.

Step 7: In this Scenario you will not be implementing a solution, so step 7 is not undertaken in this scenario

Step 8 should be completed at the end of the scenario, both individually and as a team, to identify what you’ve learned and how you can improve your learning and team performance in future.

Your tutor/ facilitator will discuss it with you.

2

3

The CSKE Consulting/ Learning Model

Problem-solving model What PBL normally includes’

1

2

3

4

5

6

7

8

What you will be doing at each stage

Understanding organizational history and context

 Scenario analysis

 Socio-technical organizational analysis.

Clarification of ambiguities a) Individual and team review of scenario text and video resources. b) Team discussion. c) Clarification of ambiguities with tutor/facilitator.

Determining the problem to be resolved

Identifying/ learning necessary knowledge

Identifying alternative solutions

Choosing optimal solution

Planning the implementation

Implementation

Final evaluation

 Requirements Analysis: identify key issues

Simulated consultation with stakeholders (e.g. through role-play and/or online interaction).

Reviewing technology/ processes in use.

 Identifying learning goals.

 Facilitator Guidance.

 Individual research & learning to resolve knowledge gaps.

 Summarising & reflection.

 Teams share learning.

 Determining and agreeing evaluation criteria and process.

 Identifying technical possibilities, considering acceptance issues and organizational fit.

 Facilitator Guidance.

 Deciding on best technical, organizational and social outcomes.

Proposing solution with justification

Applying planning and scheduling techniques.

 Proposing plan and deadlines.

Building the solution (if appropriate).

Deploying the solution (if appropriate).

 Formal evaluation methods re project success.

Personal reflection and evaluation. a) Team review of scenario: identifying key issues. b) Identifying learning goals. c) Team publish action list & summary in forum. a) Individual research & learning to resolve knowledge gaps. b) Individually creating summary of learning c) a) b) c) a) a) and how it applies to the scenario.

Team sharing learning/ teach each other.

Determining evaluation criteria through team discussion.

Team identification of options for the pentest.

Facilitator Guidance.

Team decision and justification. The

PenTest techniques.

Review Scenario text and resources. b) Produce Report. c) Presentation to tutor in role of main stakeholders. a) Team evaluation of performance and project success. b) Individual reflection on personal learning

& development.

Resources

There are a number of resources available to you:

CERT-UK. 2015. An Introduction to Social Engineering. Available online at: https://www.cert.gov.uk/resources/best-practices/an-introduction-to-social-engineering/

[Accessed 24-Nov-15]

This brief (10-page) paper provides readers with an “overview of the techniques used and the steps that can be taken to help you protect your organisation’s information”. A good starting point.

Dimensional Research. 2011 The Risk Of Social Engineering On Information Security. Available online at: http://www.greycastlesecurity.com/resources/documents/The_Risk_of_Social_Engineering_on

_Information_Security_09-11.pdf

[Accessed 24-Nov-15]

This report provides some useful background. It is based on a global survey of 853 IT professionals conducted in the United States, United Kingdom, Canada, Australia, New

Zealand, and Germany during July and August 2011. The goal of the survey was to gather data about the perceptions of social engineering attacks and their impact on businesses.

MANN,I., 2008. Hacking the Human, Social Engineering Techniques and Countermeasures.

Farnham, Gower.

An excellent, readable book. It discusses the risks, approaches to take for successful attacks, and a section on countermeasures. It is not academic and does not provide academic references to justify its statements, but it is written by a very successful practitioner.

MANN, I., 2013. Hacking the Human II, Adventures of a Social Engineer. London, ECSC.

Ian Mann’s second book of case studies.

PROOFPOINT 2015 The Human Factor 2015, Available online at: https://www.proofpoint.com/sites/default/files/documents/bnt_download/pp-human-factor-

2015_0.pdf

[Accessed 24-Nov-15]

A research report that explores phishing and what type of links users click.

SAMANI, R., MCFARLAND, C. 2015. Hacking the Human Operating System: The role of social

engineering within cybersecurity, McAfee, Available online at: http://www.mcafee.com/us/resources/reports/rp-hacking-human-os.pdf

[Accessed 24-Nov-

15]

A report from McAfee which defines Social Engineering, attacks, the attack lifecycle , channels of attack, who the attackers are and how to defend against them.

SCHNEIER, B. 2015, The Doxing Trend. https://www.schneier.com/cryptogram/archives/2015/1115.html. [Accessed 24-Nov-2015]

A bit of a sideline, but an interesting short essay by Bruce Schneier about what he sees as a key weakness in ISP email management, and their susceptibility to Social

Engineering techniques.

Xin, R. , Brody, R., Seazzu, A. & Burd, S. 2011. Social Engineering: The Neglected Human Factor for Information Security Management. Information Resources Management Journal, 24(3), 1-8.

Available at: http://www.unm.edu/~xinluo/papers/IRMJ2011.pdf

[

This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks.

4

Assessment Grading Criteria

Learning Outcome

Evidence

(graded on)

Pass (40-49%) Sound Pass (50-59%) Very Good Pass (60-69%) Excellent (70-100%) Weight

LO1.

Define the term Social

Engineering

LO2.

Explain current Social

Engineering threat vectors, how they exploit human vulnerabilities and their extent and impact.

LO3.

Explain and Justify appropriate controls.

Working With Others:

Participate constructively in team by Taking responsibility, Showing sensitivity and provide supportive feedback to others, Meeting deadlines

Team Report

Appropriate definition of social

Engineering provided.

Major trends and threat methods are explained, with reference to vulnerabilities that are exploited.

Some appropriate controls are explained.

Reports are structured with appropriate headings.

Acceptable spelling and grammar.

Mostly relevant content.

Some good quality references provided

Comprehensive definition of Social

Engineering provided.

All Major trends and threat methods are explained, with clear link made to

vulnerabilities that are exploited.

Some risks particularly relevant to

scenario identified.

Appropriate controls are explained for

all stated risks.

Alternatives are discussed, but may be briefly.

Report structured with appropriate headings.

Generally appropriate level of detail, but inconsistent.

Good quality references provided with correct syntax. Range may be limited.

As sound pass and presentation clearly links features/ benefits of solution with client needs and problems.

Comprehensive definition of Social

Engineering provided with discussion of how

it is relevant to the scenario.

As ‘very good pass’ and

Systematic and thorough analysis of social engineering trends.

Critical evaluation of alternate solutions

provided.

Systematic and thorough evaluation of

relevant current threats, clearly explaining the vulnerabilities that are exploited.

Shows good ingenuity in

devising attacks.

Appropriate controls are explained for all

stated risks.

Alternatives are discussed

critically highlighting key issues

70%

Alternatives are discussed highlighting key

issues.

Written in clear consistent and appropriate

(business) style of English.

Technical detail explained appropriately.

An appropriate range of good quality references provided with correct syntax.

Complete & consistent

solution.

Clear, concise and

complete with appropriate level of detail throughout almost all

report.

Presentation is persuasive, balanced, thorough and clearly links features/benefits

of solution to client needs/problems

Presentation is consistent with, and relates to report.

20%

Presentation is consistent with, report.

As pass and presentation

emphasises key points and has

balanced content.

Timekeeping, oral contributions,

VLE postings, timeliness of work produced.

Usually communicates quickly with others if problems attending or meeting commitments, On time for most meetings, Completes most work allocated. NB Students can be excluded from teams for not meeting these requirements.

Considered reliable by team mates.

Almost always communicates quickly with others & renegotiates if problems attending or meeting commitments,

Shares work with others in timely way.

As Sound pass and on time for almost all meetings, Completes all work as agreed.

As Very good pass and shows initiative / leadership in some areas of work.

10%

5

Context

Reference documents which underpin the knowledge/tasks for incident management are summarised below:

ISO/IEC 27001:2013/ 27002:2013

This scenario relates principally to Control categories in Clause A7.2 and A.9.2.4 of ISO27002.

A.7 Human resource security

A.7.2 During employment

Objective: To ensure that employees and contractors are aware of and fulfil their information security responsibilities.

A.7.2.1 Management responsibilities

Control

Management shall require all employees and contractors to apply information security in accordance with the established policies and procedures of the organization.

A.7.2.2 Information security awareness, education and training

Control

All employees of the organization and, where relevant, contractors shall receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function.

A.7.2.3 Disciplinary process

Control

There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach.

A.9.2.4

Management of secret authentication information of users

Control

The allocation of secret authentication information shall be controlled through a formal management process.

6

Download