Abstract
By nearly every metric, the status quo of information security is not working. The interaction matrix of attacker-defender dynamics strongly favors the attacker who only needs to be lucky once. We argue that employing social engineering active defense (SEAD) will be more effective to countering malicious actors than maintaining the traditional passive defensive strategy. The Offensive Countermeasures (OCM) approach to defense advocates for three categories of countermeasures: annoyance, attribution, and attack. Annoyance aims to waste the attacker’s time and resources with the objective of not only deterrence but also to increase the probability of detection and attribution. Attribution attempts to identify who is launching the attack. Gathering as much threat intelligence on who the attacker is, provides the best possible defense against future attacks. Finally, attack involves running code on the attacker’s system for the purpose of deterrence and attribution. In this work, we advocate for utilizing similar approaches to deny, degrade, and de-anonymize malicious actors by using social engineering tools, tactics, and procedures against the attackers. Rather than fearing the threats posed by synthetic media, cyber defenders should embrace these capabilities by turning these against criminals. Future research should explore ways to implement synthetic media and automated SEAD methods to degrade the capabilities of online malicious actors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
FBI: Internet Crime Complaint Center (IC3). Internet Crime Report 2020. Washington, DC (2021b)
Verizon: DBIR 2021 Data Breach Investigations Report. Verizon, New York (2021)
Hadnagy, C.: Social Engineering: The Science of Human Hacking. John Wiley & Sons, New York (2018)
Wixey, M.: Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering. Black Hat USA, Las Vegas (2018)
Canham, M.: Deepfake Social Engineering: Creating a Framework for Synthetic Media Social Engineering. Black Hat USA, Las Vegas (2021)
Wilkerson, W.S., Levy, Y., Kiper, J.R., Snyder, M.: Towards a development of a Social Engineering eXposure Index (SEXI) Using Publicly Available Personal Information. In: 2017 KSU Conference on Cybersecurity Education, Research, and Practice. Kennesaw State University, Kennesaw (2017)
Wilkerson, W.S.: Development of a Social Engineering eXposure Index (SEXI) Using Open-Source Personal Information. Doctoral Dissertation, Nova Southeastern University, Fort Lauderdale-Davie (2021)
Seymour, J., Tully, P.: Generative models for spear phishing posts on social media. arXiv preprint arXiv:1802.05196 (2018)
% Jump in E-Gift Card Bot Attacks since COVID-19 Lockdowns began. https://www.techrepublic.com/article/820-jump-in-e-gift-card-bot-attacks-since-covid-19-lockdownsbegan/. Accessed 21 Mar 2021
Lim, E., Tan, G., Hock, T., Lee, T.: Turing in a Box: Applying Artificial Intelligence as a Service to Targeted Phishing and Defending Against AI-Generated Attacks. Black Hat USA, Las Vegas (2021)
FBI: Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations. Federal Bureau of Investigations Private Industry Notification. Washington, DC (2021a)
‘Deepfake’ Audio Evidence Used in UK Court to Discredit Dubai Dad, 26 October 2021. https://www.thenationalnews.com/uae/courts/deepfake-audio-evidence-used-in-uk-court-to-discredit-dubai-dad-1.975764
Fraudsters Used AI to Mimic CEO's Voice in Unusual Cybercrime Case. https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402. Accessed 29 July 2020
Fraudsters Cloned Company Director's Voice in $35 Million Bank Heist, Police Find. https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=35955ba77559. Accessed 14 Oct 2021
Strand, J., Asadoorian, P., Robish, E., Donnelly, B., Galbraith, B.: Offensive Countermeasures: The Art of Active Defense. CreateSpace Independent Publishing Platform, Scotts Valley (2017)
Telephone Spam/Scam Problem? Bring in the Robots. https://www.youtube.com/watch?v=UXVJ4JQ3SUw. Accessed 02 Jan 2022
Absolute Proof that Jolly Roger Telephone is Disrupting the Vacation Cruise Telemarketers. https://www.youtube.com/watch?v=ezZ2V1CH32E. Accessed 02 Jan 2022
This is What Happens When You Reply to Spam Email. TED Global Geneva. https://www.ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email?language=sc#t-149006. Accessed 07 Dec 2021
Ultimate troll. https://www.youtube.com/watch?v=3MHDDSekvcE. Accessed 22 Dec 2021
Gutzwiller, R., Ferguson-Walter, K., Fugate, S., Rogers, A.: “Oh, Look, A Butterfly!” A framework for distracting attackers to improve cyber defense. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 62, no. 1, pp. 272–276. Sage Publications, Los Angeles (2018)
Monaco, J.V.: Bug or feature? Covert impairments to human computer interaction. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–15 (2020)
AI vs. AI. Two Chatbots Talking to Each Other. https://www.youtube.com/watch?v=WnzlbyTZsQY. Accessed 22 Dec 2021
Odemis, M., Yucel, C., Koltuksuz, A., Ozbilgin, G.: Suggesting a honeypot design to capture hacker psychology, personality and sophistication. In: 13th International Conference on Cyber Warfare and Security. Academic Conferences, Washington, DC (2018)
Macknik, S., Martinez-Conde, S., Blakeslee, S.: Sleights of Mind: What the Neuroscience of Magic Reveals about our Everyday Deceptions. Henry Holt and Company, New York (2010)
Naini, F.M., Unnikrishnan, J., Thiran, P., Vetterli, M.: Where you are is who you are: user identification by matching statistics. IEEE Trans. Inf. Forensics Secur. 11(2), 358–372 (2015)
Abramson, M.: Cognitive fingerprints. In: 2015 AAAI Spring Symposium Series. Palo Alto (2015)
Watanabe, D.: Digital behavioral criminalistics: the art and science. In: Proceedings of the 9th Annual Mid-Atlantic INLETS: Violent Crimes and Terrorism Trends, Washington, DC (2018)
Malin, C.: Digital behavioral criminalistics to elucidate the cyber pathway to intended violence. In: Meloy, J.R., Hoffmann, J. (eds.) International Handbook of Threat Assessment, 2nd edn. Oxford University Press, Oxford (2021)
Wixey, M.: Betrayed by the Keyboard: How What You Type Can Give You Away
Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots. ShmooCon 2016. https://shmoo.gitbook.io/2016-shmoocon-proceedings/one_track_mind/06_where_do_the_phishers_live. Accessed 07 Dec 2021
Showing, A.: Craigslist Scammer Who's Boss Using Python. https://www.youtube.com/watch?v=UtNYzv8gLbs. Accessed 07 Dec 2021
Sawa, Y., Bhakta, R., Harris, I.G., Hadnagy, C.: Detection of social engineering attacks through natural language processing of conversations. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp. 262–265. IEEE, New York (2016)
Lansley, M., Mouton, F., Kapetanakis, S., Polatidis, N.: SEADer++: social engineering attack detection in online environments using machine learning. J. Inf. Telecommun. 4(3), 346–362 (2020)
Golovianko, M., Gryshko, S., Terziyan, V., Tuunanen, T.: Towards digital cognitive clones for the decision-makers: adversarial training experiments. Procedia Comput. Sci. 180, 180–189 (2021)
Cialdini, R.: Pre-Suasion: A Revolutionary Way to Influence and Persuade. Simon and Schuster, New York (2016)
Canham, M., Dawkins, S., Jacobs, J.: Manuscript Under Review
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Canham, M., Tuthill, J. (2022). Planting a Poison SEAD: Using Social Engineering Active Defense (SEAD) to Counter Cybercriminals. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2022. Lecture Notes in Computer Science(), vol 13310. Springer, Cham. https://doi.org/10.1007/978-3-031-05457-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-05457-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-05456-3
Online ISBN: 978-3-031-05457-0
eBook Packages: Computer ScienceComputer Science (R0)