Social Engineering

Social Engineering cyber attack

Blackshadow group breaches Israeli company; Cyberserve.

- Posted in Social Engineering by

Iranian hacking group Blackshadow succeeded in penetrating the infrastructure of Israeli webhosting firm Cyberserve and proceeded to leak confidential client data on Telegram as proof of the breach. Blackshadow had posted a 1 million USD bounty as the ransom, stipulating a 48 hour time limit for payment. Cyberserve chose not to make the payment, and in response the group started leaking more documents to the public. The leak included 290000 medical records, as reported by i24news.tv, from the Machon Mor medical institute. It appears that of the known affected clients from Cyberserve, are Israeli based companies; Blackshadow has been known to use ransomware in the past against Israeli firms, and there is a strong suspicion that these companies are now at risk.

Jerusalem Post reported that Israeli authorities have pushed search engines and ISPs to block access to content related to Blackshadow and its posted/leaked documents. The secure message service from Telegram unsuccessfully blocked the group, and despite deleting Blackshadows Telegram account, the group made a new account and leaked even more captured data in response. The new leaked data included personal information from a Cyberserve travel agency client.

After researching Cyberserve, I have found that Cyberserve uses Tucows as their DNS registrar, and Cloudflare is their cloud services provider. This is important because Cloudflare has a history of being breached, with one of their most highly publicized events being the Cloudbleed vulnerability in 2017. To quote Tavis Ormandy of Googles Security Team at the time.Project Zero

"We fetched a few live samples, and we observed encryption keys, cookies, passwords, chunks of POST data and even HTTPS requests for other major cloudflare-hosted sites from other users."

Why this attack matters: this is just another example of what happens when providers do not implement and maintain minimum security controls and/or training to assist in mitigation of the timeframes an attack vector is available. As this was a ransomware attack, concerns and diligence needs to be maintained as social engineering attacks are likely from the released data, emphasizing the importance of strong social engineering awareness training every organization, big or small, should undertake on a regular schedule.

The above quote also raises concerns towards the security of Cloudflare. If a 3rd party cloud provider using virtually pooled resources such as virtual machines, containers or dockers either fails to protect confidential information within their own ecosystem as a prior article explains for Microsoft Azure and OMIGOD, or if data is leaked externally, like the issues faced on Cloudflare with Cloudbleed using a shared connection such as a reverse proxy, then organizations should think twice before using shared services when hosting sensitive data.

We recommend where the data is sensitive in nature, dedicated hardware is engaged in a secure cloud environment.

Verify End-Users to Prevent Social Engineering Cyber Attack

- Posted in Social Engineering by

Social engineering is "the art of manipulating people in ways that result in them giving up confidential information. There are many different types of social engineering scams and schemes, but one area that is often overlooked is the helpdesk, or first contact assistance (as in a lawyer or accountant being engaged on a query).

Social Engineering

The first step in such an attack is usually for the attacker to gather information about the organization that they are targeting. Information freely available on the Internet, and repeated in a way to engage the operator into releasing more. The attacker will usually use the information freely available on the internet to gain trust from the operator through the use of key words that link certain queues that connect the operator to release information as to who in the organization controls or handles the query type. They then continue the manipulation to figure out who within the organization is most likely to have elevated permissions or access sensitive information. An attacker can often get the freely available queues through a simple Google search or by querying business-oriented social networks such as LinkedIn or business Facebook accounts.

Once an attacker identifies a user whose credentials they want to steal, they can often obtain the email accounts from the business websites which connects them to the most common username possibility, the staff members email address. In the helpdesk situation an attacker may engage the operator by claiming they are the person from the organization and they cannot connect to the organization's Active Directory environment. Often an operator (especially when the helpdesk is a third party contractor) will tell you if you that the username is incorrect and provide the username information. This provides the attacker with a win for 50% of the battle.

When entered, the attacker will then say it is still not working, and a password reset may be initiated. If the attacker is sophisticated enough, they may have already obtained information from a leaked database and already have access to the email server where the password reset will be sent. Other options may include simply saying they never got the email and have the operator send it to their chosen phone number.

In several organizations security questions are used to combat the above scenario. However, it has been reported that security questions are largely ineffective. An experienced attacker can easily acquire the answers to security questions from any number of different sources. The Dark Web for instance, contains entire databases of answers to potential security questions and we know end-users often divulge way too much personal information on social media that provide the exact answers to security questions they use.

Some organizations have historically used caller ID information as a tool for verifying a user's identity. However, this method has also proven unreliable because cloud-based PBX systems make it simple for an attacker to spoof caller ID information.

Social engineering attacks are not theoretical attack vectors, they are happening in the real world regularly. Earlier this year, Electronic Arts was infiltrated by hackers who stole a large amount of data (including source code for the company's FIFA 21 soccer game), by tricking the company's IT support staff into giving them access to the company's network.

The key to preventing social engineering attacks against the frontline staff and in the helpdesk is to make information impossible to gain from these staffed areas to knowingly or unknowingly aid in such an attack.

Consider the earlier example in which an attacker contacts an organization's helpdesk pretending to be an employee who needs their password reset. Several things could conceivably happen during that conversation. Some possible outcomes include:

  1. The attacker answers the security question using stolen information sourced from social media or from the Dark Web.

  2. The attacker tries to gain the staff members trust through friendly conversation to gain favor in the hope that they will overlook the rules and go ahead and reset the password, even in the absence of the required security information. In some situations, the attacker might also try to make the staff member feel sorry for them.

  3. The attacker might try to intimidate the staff member by posing as a person in authority who is extremely upset that they cannot log in. When the staff member asks a security question, the attacker might scream that they do not have time to answer a bunch of stupid questions, and demand that the password be reset right now (this technique has succeeded many times).

Ultimately, the staff members discretion is the only thing standing between the attacker and exploitation that determines whether the information requested or password reset is going to happen.

The best way to prevent such an attack is to:

  1. limit information on social media to information that is not used in any security question information
  2. Use security questions that are not related to personal information like pets, birth place and so on.
  3. If it is a network issue (helpdesk) make call backs to the internal contact of the staff member mandatory for password resets.
  4. Have operators confirm other current information as a security check.
  5. Do not use for confirmation or verification anything that was sent via email.
  6. Don't put all your eggs in one basket. I.e. don't use devices or authenticators from the same organization that controls your Active Directory for example as a compromise will give that information out and the authenticator can be spoofed or cloned. Use SMS if you have google accounts rather than google authenticator for example.
  7. Make 2 factor Authentication to non email options mandatory.

These are just a few tips to add to security at the front lines.