Skip to main content

Planting a Poison SEAD: Using Social Engineering Active Defense (SEAD) to Counter Cybercriminals

  • Conference paper
  • First Online:
Augmented Cognition (HCII 2022)

Abstract

By nearly every metric, the status quo of information security is not working. The interaction matrix of attacker-defender dynamics strongly favors the attacker who only needs to be lucky once. We argue that employing social engineering active defense (SEAD) will be more effective to countering malicious actors than maintaining the traditional passive defensive strategy. The Offensive Countermeasures (OCM) approach to defense advocates for three categories of countermeasures: annoyance, attribution, and attack. Annoyance aims to waste the attacker’s time and resources with the objective of not only deterrence but also to increase the probability of detection and attribution. Attribution attempts to identify who is launching the attack. Gathering as much threat intelligence on who the attacker is, provides the best possible defense against future attacks. Finally, attack involves running code on the attacker’s system for the purpose of deterrence and attribution. In this work, we advocate for utilizing similar approaches to deny, degrade, and de-anonymize malicious actors by using social engineering tools, tactics, and procedures against the attackers. Rather than fearing the threats posed by synthetic media, cyber defenders should embrace these capabilities by turning these against criminals. Future research should explore ways to implement synthetic media and automated SEAD methods to degrade the capabilities of online malicious actors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. FBI: Internet Crime Complaint Center (IC3). Internet Crime Report 2020. Washington, DC (2021b)

    Google Scholar 

  2. Verizon: DBIR 2021 Data Breach Investigations Report. Verizon, New York (2021)

    Google Scholar 

  3. Hadnagy, C.: Social Engineering: The Science of Human Hacking. John Wiley & Sons, New York (2018)

    Book  Google Scholar 

  4. Wixey, M.: Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering. Black Hat USA, Las Vegas (2018)

    Google Scholar 

  5. Canham, M.: Deepfake Social Engineering: Creating a Framework for Synthetic Media Social Engineering. Black Hat USA, Las Vegas (2021)

    Google Scholar 

  6. Wilkerson, W.S., Levy, Y., Kiper, J.R., Snyder, M.: Towards a development of a Social Engineering eXposure Index (SEXI) Using Publicly Available Personal Information. In: 2017 KSU Conference on Cybersecurity Education, Research, and Practice. Kennesaw State University, Kennesaw (2017)

    Google Scholar 

  7. Wilkerson, W.S.: Development of a Social Engineering eXposure Index (SEXI) Using Open-Source Personal Information. Doctoral Dissertation, Nova Southeastern University, Fort Lauderdale-Davie (2021)

    Google Scholar 

  8. Seymour, J., Tully, P.: Generative models for spear phishing posts on social media. arXiv preprint arXiv:1802.05196 (2018)

  9. % Jump in E-Gift Card Bot Attacks since COVID-19 Lockdowns began. https://www.techrepublic.com/article/820-jump-in-e-gift-card-bot-attacks-since-covid-19-lockdownsbegan/. Accessed 21 Mar 2021

  10. Lim, E., Tan, G., Hock, T., Lee, T.: Turing in a Box: Applying Artificial Intelligence as a Service to Targeted Phishing and Defending Against AI-Generated Attacks. Black Hat USA, Las Vegas (2021)

    Google Scholar 

  11. FBI: Malicious Actors Almost Certainly Will Leverage Synthetic Content for Cyber and Foreign Influence Operations. Federal Bureau of Investigations Private Industry Notification. Washington, DC (2021a)

    Google Scholar 

  12. ‘Deepfake’ Audio Evidence Used in UK Court to Discredit Dubai Dad, 26 October 2021. https://www.thenationalnews.com/uae/courts/deepfake-audio-evidence-used-in-uk-court-to-discredit-dubai-dad-1.975764

  13. Fraudsters Used AI to Mimic CEO's Voice in Unusual Cybercrime Case. https://www.wsj.com/articles/fraudsters-use-ai-to-mimic-ceos-voice-in-unusual-cybercrime-case-11567157402. Accessed 29 July 2020

  14. Fraudsters Cloned Company Director's Voice in $35 Million Bank Heist, Police Find. https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=35955ba77559. Accessed 14 Oct 2021

  15. Strand, J., Asadoorian, P., Robish, E., Donnelly, B., Galbraith, B.: Offensive Countermeasures: The Art of Active Defense. CreateSpace Independent Publishing Platform, Scotts Valley (2017)

    Google Scholar 

  16. Telephone Spam/Scam Problem? Bring in the Robots. https://www.youtube.com/watch?v=UXVJ4JQ3SUw. Accessed 02 Jan 2022

  17. Absolute Proof that Jolly Roger Telephone is Disrupting the Vacation Cruise Telemarketers. https://www.youtube.com/watch?v=ezZ2V1CH32E. Accessed 02 Jan 2022

  18. This is What Happens When You Reply to Spam Email. TED Global Geneva. https://www.ted.com/talks/james_veitch_this_is_what_happens_when_you_reply_to_spam_email?language=sc#t-149006. Accessed 07 Dec 2021

  19. Ultimate troll. https://www.youtube.com/watch?v=3MHDDSekvcE. Accessed 22 Dec 2021

  20. Gutzwiller, R., Ferguson-Walter, K., Fugate, S., Rogers, A.: “Oh, Look, A Butterfly!” A framework for distracting attackers to improve cyber defense. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol. 62, no. 1, pp. 272–276. Sage Publications, Los Angeles (2018)

    Google Scholar 

  21. Monaco, J.V.: Bug or feature? Covert impairments to human computer interaction. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1–15 (2020)

    Google Scholar 

  22. AI vs. AI. Two Chatbots Talking to Each Other. https://www.youtube.com/watch?v=WnzlbyTZsQY. Accessed 22 Dec 2021

  23. Odemis, M., Yucel, C., Koltuksuz, A., Ozbilgin, G.: Suggesting a honeypot design to capture hacker psychology, personality and sophistication. In: 13th International Conference on Cyber Warfare and Security. Academic Conferences, Washington, DC (2018)

    Google Scholar 

  24. Macknik, S., Martinez-Conde, S., Blakeslee, S.: Sleights of Mind: What the Neuroscience of Magic Reveals about our Everyday Deceptions. Henry Holt and Company, New York (2010)

    Google Scholar 

  25. Naini, F.M., Unnikrishnan, J., Thiran, P., Vetterli, M.: Where you are is who you are: user identification by matching statistics. IEEE Trans. Inf. Forensics Secur. 11(2), 358–372 (2015)

    Article  Google Scholar 

  26. Abramson, M.: Cognitive fingerprints. In: 2015 AAAI Spring Symposium Series. Palo Alto (2015)

    Google Scholar 

  27. Watanabe, D.: Digital behavioral criminalistics: the art and science. In: Proceedings of the 9th Annual Mid-Atlantic INLETS: Violent Crimes and Terrorism Trends, Washington, DC (2018)

    Google Scholar 

  28. Malin, C.: Digital behavioral criminalistics to elucidate the cyber pathway to intended violence. In: Meloy, J.R., Hoffmann, J. (eds.) International Handbook of Threat Assessment, 2nd edn. Oxford University Press, Oxford (2021)

    Google Scholar 

  29. Wixey, M.: Betrayed by the Keyboard: How What You Type Can Give You Away

    Google Scholar 

  30. Where Do the Phishers Live? Collecting Phishers’ Geographic Locations from Automated Honeypots. ShmooCon 2016. https://shmoo.gitbook.io/2016-shmoocon-proceedings/one_track_mind/06_where_do_the_phishers_live. Accessed 07 Dec 2021

  31. Showing, A.: Craigslist Scammer Who's Boss Using Python. https://www.youtube.com/watch?v=UtNYzv8gLbs. Accessed 07 Dec 2021

  32. Sawa, Y., Bhakta, R., Harris, I.G., Hadnagy, C.: Detection of social engineering attacks through natural language processing of conversations. In: 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), pp. 262–265. IEEE, New York (2016)

    Google Scholar 

  33. Lansley, M., Mouton, F., Kapetanakis, S., Polatidis, N.: SEADer++: social engineering attack detection in online environments using machine learning. J. Inf. Telecommun. 4(3), 346–362 (2020)

    Google Scholar 

  34. Golovianko, M., Gryshko, S., Terziyan, V., Tuunanen, T.: Towards digital cognitive clones for the decision-makers: adversarial training experiments. Procedia Comput. Sci. 180, 180–189 (2021)

    Article  Google Scholar 

  35. Cialdini, R.: Pre-Suasion: A Revolutionary Way to Influence and Persuade. Simon and Schuster, New York (2016)

    Google Scholar 

  36. Canham, M., Dawkins, S., Jacobs, J.: Manuscript Under Review

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthew Canham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Canham, M., Tuthill, J. (2022). Planting a Poison SEAD: Using Social Engineering Active Defense (SEAD) to Counter Cybercriminals. In: Schmorrow, D.D., Fidopiastis, C.M. (eds) Augmented Cognition. HCII 2022. Lecture Notes in Computer Science(), vol 13310. Springer, Cham. https://doi.org/10.1007/978-3-031-05457-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05457-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05456-3

  • Online ISBN: 978-3-031-05457-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics