Most organisations and people have information about themselves on the Internet. Companies advertise with it and people share tonnes of personal information with their friends and families. With this wealth of information so widely available, it is little wonder that criminals can and do use it for malicious purposes.
Malicious individuals, rival companies and even foreign intelligence agencies can use the information found online to learn more about a target. This method of collecting information is known as reconnaissance and is used for social engineering and phishing attacks.
Social media profiles in particular leave us exposed to hostile or nefarious acts as they reveal both personal and professional information that can be exploited and used to plan cyber-attacks, or in some cases physical attacks.
A hacker’s job is made a lot easier if they have certain details about a network and its users. By using reconnaissance techniques on online profiles, company websites or blogs, the hacker can learn employee job roles, contact details and addresses.
Using the information gleaned from online profiles, a cybercriminal can gain access to an organisations system or target a malware campaign at an individual. Learning a target’s email address for example would allow the hacker to launch spear phishing attacks.
Do not panic
Before you rush off to close your social media accounts in a panic; stop and think.
What is the likelihood of a hacker or spy agency monitoring you? Have you done something to warrant such attention? Do you work for a company that could be an appealing target? If not, then aside from taking common sense precautions you are likely to be safe. However, if you do fall under those categories you should consider taking extra security steps.
Thanks to better education and media attention, most people will not open a random, obviously dodgy email. As a result hackers have altered their game to make Phishing attacks more targeted, hence the name spear phishing. By using the information taken from online profiles, the hacker can tailor the malicious email to better entice the target into opening it. Once on a system, the malware contained in the email will signal to IP addresses owned by the hacker, who may then task the malware to transmit sensitive information from the network, across the Internet.
Reducing the risks
If using social media, ensure that you set the security settings correctly. Never have your profile be public and never share sensitive information in your posts. Ideally, your social media profile should be set so that only your friends and family can see your posts. Posting your phone number, your address or pictures of your workplace should be avoided at all times.
For organisations using social media for marketing purposes the marketer should avoid posting any sensitive information and should keep a close eye on the profile for any sign of hostile reconnaissance taking place.
Make sure that your username does not include any personal information. For example: Rob@Liverpool is a bad choice. You should also set up a separate email account to register and receive email from the site. That way if you want to close down your account/page, you can simply stop using that email account.
Always use strong passwords that have no relation to any of the content on your online profiles and keep an eye on what others say about you online too. A friend could post some private information that could give a hacker a way in.
As well as taking these steps you need to ensure that you have up-to-date antivirus/antispyware software installed.
Social engineering is a method used by hackers to manipulate people into giving up sensitive information. The sort of information the criminal is after are often passwords or bank details.
The experts at PGI say: “Social engineering methods are effective as they take advantage of most people’s natural inclination to trust.
It is a lot easier to trick someone into giving up their password than it is to hack it. Social Engineering is the subtle art of human manipulation in order to control and change the actions of others.
It plays on common psychological vulnerabilities to alter the outcomes in your favour.
You are vulnerable if: You are helpful, you avoid confrontation, you like something for free, you try and be efficient, and you fear repercussions from management. The best defence against social engineering attempts is education.”
Basic ways to counter Social engineering
Slow down - if an email conveys a sense of urgency, or uses high-pressure sales tactics, always be sceptical.
Chances are that a criminal is trying to trick you into giving up your information. On the physical side of things always be aware of your surroundings. If you don’t recognise someone do not let them into your building, scammers often rely on people being polite (holding doors open etc…)
Research the facts - You should always be wary of unsolicited messages. If an email looks like it is from a company you use (or have used), do your own research. Use a search engine to go to the real company’s site, or a phone directory to find their phone number, never trust such emails until you are sure that it is the real deal.
Delete any request for financial information or passwords - Any message asking for personal details is a scam. Delete it.
Don’t let a link control where you land – When receiving an email containing links, do not click on them as they may not be legitimate.
By educating people on the threats posed by social engineering, the threat can be reduced significantly. Knowing what looks suspicious, what not to click on and keeping sensitive details secure could safe an organisation a huge amount of money in the long term.
Types of Social engineering
Pretexting – This form of social engineering sees attackers create a fabricated scenario to trick their victims into giving up personal information.
Quid pro quo - A good example of this type of social engineering is a scam where someone claiming to be from a service provider (often they claim to be from an IT service provider) calls asking for details.
The fraudsters often promise a quick fix to an issue in exchange for the victim disabling their antivirus program and for installing malware on their computers that assumes the guise of software updates.
Baiting – Criminals often take advantage of people’s inherent desire for free stuff. Baiters often offer users free music or movie downloads, if they surrender their login credentials to a certain site.
Tailgating – Social engineering also employs physical tactics as well as cyber ones. The best example is tailgating. This is where someone who lacks proper security clearance follows an employee into a restricted area.
Want to beat social engineering? Contact the PGI team get started.
Protection Group International believes that cyber security doesn’t need to be overly complicated, incomprehensible or vastly expensive. We specialise in delivering strategic vulnerability assessment services and offer a range of senior cyber awareness education to enable you to tackle cyber threats in-house. For more information click here.
Our partner company, Protection Vessels International, is focussed on the efficient delivery of high quality, cost effective security solutions for the maritime community. We invest in our well-maintained logistic infrastructure to enhance customers’ business continuity through the protection of their assets and people. For more information click here.
Your free global geopolitical
PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.
The Risk Portal gives users up-to-date information and analysis on global affairs.
The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.
Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.
Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.
Making ongoing compliance easier for you and your business
GDPR is now in force – make sure your business meets the necessary requirements and assurance for all your customers and employees
A full audit of your business to assess the level of your compliance against GDPR requirements
Become GDPR compliant with minimal work – we’ll conduct an analysis, review, report and implementation of necessary changes to your business
We’ll carry out simple assessments of security to help you understand and mitigate the potential risks to your business
Get your business ready to face the cyber challenge
We provide a full range of accredited, certified and bespoke services that assess the resilience of your cyber security posture
PGI’s Qualified Security Assessors (QSA) will help you meet Payment Card Industry Data Security Standards (PCI DSS)
Find out more on PCI DSS
Demonstrate your commitment to cyber security by achieving and maintaining accreditation for the globally-recognised information security standard
Find out more on ISO 27001
Understand the threats of phishing and malware to avoid being targeted
Undertake our phishing capability assessment to reduce your organisation’s risk of of attack, by measuring the cyber awareness of your workforce.
PGI will conduct a tailored phishing campaign, using multiple methods, to identify realism and train employees where necessary to mitigate future attacks
PGI monitor multiple metrics to identify the types of phishing, generate in-depth analysis reports and provide an informed decision to help improve your organisation’s level of security and awareness
Prevent attacks, respond to breaches and protect your business
Our bespoke range of cyber security services not only protect your critical assets but provide the education you need to keep your operations and data safe.
implement the cost-effective cyber security measure launched by the government to prevent cyber-attacks, demonstrate commitment to your clients, and attract new business by being recognised as a secure organisation
Find out more on Cyber Essentials Accreditation
The most effective way to identify how attackers target your organisation’s weaknesses by evaluating your system and network security and reporting on any vulnerabilities that could lead to a business impact
Find out more on Penetration Testing
If your business has experienced breaches, network compromises or operational disruption, our team of cyber security specialists can deploy quickly, and efficiently begin the process of detecting and eliminating the threat
Find out more on Data Breach Response & Recovery
Data Breach Response & Recovery
We prevent attacks, respond to security breaches, and protect your business
Our team of specialists can deploy quickly and efficiently to begin the process of detecting, eliminating and prevention of future threats of a breach.
A vital part of the response process is making a copy of your data for safe forensic analysis. We will work with you to preserve and use this evidence to discover the extent of an intrusion
Find out more on Digital Forensics
We will identify and minimise the risks, as well as the possibility of future risks to your business
Consistent interaction with your management team and recommendations on how to approach all outcomes that need attention
Subscribe to our Cyber Bytes Newsletter
Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.