Phone phishing, just one way to social engineer information from end users

Social engineering is used to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity.

The following is a recent real life example which would seem very innocuous.

An associates phone rings.  The person identified herself as working for the accounts receivable department.  She indicated to the user that the phone extension he had was noted as sitting near an HP Color Printer.  She asked if he could provided the model and serial number for her records.  (Before we go any further, how many of you reading this sit “near” and HP printer?)

The user was keen enough to ask the caller’s name.  She responded with only a first name “Kathy”.  Fortunately this set off a red flag that something many not be completely legitimate with her request.  He then indicated it wasn’t necessarily a good time for him and asked if he could get the information and send it to her in an email.  Still suspicious but now afraid the caller may just hang up, the user stalled and answered “oh yes, there is an HP printer right here” and gave the model number, but nothing specific to the device or the company he works for (serial number or IP address).

After saying this, the caller seemed more interested again and continued to ask how they administer and maintain the printers.  The end user indicated he wasn’t sure and would have to ask.  He then asked for her last name to which she responded “White”.  Being resourceful, the user quickly checked the companies Active Directory.  No users matched that specific name.

He then offered to get the rest of the information and call her back.  The caller indicated that the phone she was using was only able to make outbound calls and she wasn’t sure what number would call her area (does this sound like any phone in your company?).  When he insisted he’d need to call her back, she quickly hung up on him.

By asking specific and probing questions, a caller may be able to piece together enough information to infiltrate an organization’s network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility.  While each of those pieces of information may seem insignificant by themselves, in total, they may give a hacker just the information they need to footprint a company or network in order to run a targeted attack on the environment.

Steve Jobs 1 – Adobe 0

Adobe Flash Player Icon

Image via Wikipedia

Apparently Steve’s bet on mobile platforms free from Flash will have ramifications beyond Apple IOS devices.

While competitors happily used the lack of Flash support to help spur sells of their non-Apple devices, Adobe has now abandoned a strategy to continue to develop Flash for mobile devices (I think they mean mobile OS’s) and instead will work more diligently to comply with the HTML5 standard.

More information can be found in the exclusive ZDNet article here.

Is a 10 minute nationwide RoadRunner outage noticeable? Uhhh… yeah.

While all the details aren’t out yet.  It looks like Time Warner Cable/Road Runner took a 10 minute network outage today at 6:10 PDT.

From what I noted and backed up with other online resources, it looks like there may have been a “flap” with one of the core routers (pulled from DSL reports board).

Even some speculation that it may have been related to this issue noted via twitter regarding the a Juniper bug and a BGP route distribution.

Regardless the hit was widespread and has shown to have disrupted services across the globe.

Noticeable?  Absolutely.  Sadly the first indication I received was from my wife indicating that nothing at home was working.  Instinct was to call the TWC help number already preprogrammed into my phone.  When the major support numbers from TWC all inaccessible, it occurred to me that there may have been more than a local outage.

When we finally saw some monitoring reports, it was confirmed.  My wife is quicker than your average network monitoring tool.  🙂