Jump to content

Hackers Dupe World's Biggest Companies


Infiltrator
 Share

Recommended Posts

HACKERS at an infamous DefCon gathering are proving that old-fashioned smooth talk rivals slick software skills when it comes to pulling off attacks on computer networks.

A first-ever "social engineering'' contest challenges hackers to call workers at 10 companies including technology titans Google, Apple, Cisco, and Microsoft and get them to reveal too much information to strangers.

"Out of all the companies called, not one company shut us down,'' said Offensive Security operations manager Christopher Hadnagy, part of the social-engineer.org team behind the competition. The team kept hackers within the boundaries of the law, but had them coax out enough information to show that workers would have unintentionally made it easier to attack networks. Workers that unknowingly ended up on calls with hackers ranged from a chief technical officer to IT support personnel and sales people.

One employee was conned into opening programs on a company computer to read off specifications regarding types of software being used, details that would let a hacker tailor viruses to launch at the system. "You often have to crack through firewalls and burn the perimeter in order to get into the internal organisation,'' Mati Aharoni of Offensive Security, a company that tests company computer defences, said.

"It is much easier to use social engineering techniques to get to the same place.'' Other companies targeted were Pepsi, Coca Cola, Shell, BP, Ford, and Proctor & Gamble. The contest, still taking place at DefCon and promises the winner an Apple iPad tablet computer, is intended to show that hardened computer networks remain vulnerable if people using them are soft touches.

"We didn't want anyone fired or feeling bad at the end of the day,'' Aharoni said." We wanted to show that social engineering is a legitimate attack vector.'' A saying that long ago made it onto T-shirts at the annual DefCon event is ``There is no patch for human stupidity.''

"Companies don't think their people will fall for something as simple as someone calling and just asking a few questions,'' Hadnagy said." It doesn't require a very technical level of attacker,'' Aharoni added. ``It requires someone with an ability to schmooze well.''

One worker nearly foiled a hacker by insisting he send his questions in an email that would be reviewed and answered if appropriate. The hacker convinced the worker to change his mind by claiming to be under pressure to finish a report for a boss by that evening.

"As humans, we naturally want to help other people,'' Hadgagy said. "I'm not advocating not helping people. Just think about what you say before you say it.'' Information about "exploiting human vulnerabilities'' was available at the social-engineer.org website.

Original article can be found here: http://www.news.com.au/technology/hackers-...r-1225899446290

Link to comment
Share on other sites

go social engineering

Kevin Mitnick ruled back in the old days.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...