skip to main content
10.1145/2523514.2523596acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
invited-talk

Social engineering attacks on the knowledge worker

Published:26 November 2013Publication History

ABSTRACT

Social engineering has become an emerging threat in virtual communities and is an effective means to attack information systems. Today's knowledge workers make use of a number of services that leverage sophisticated social engineering attacks. Moreover, there is a trend towards BYOD (bring your own device) policies and the usage of online communication and collaboration tools in private and business environments. In globally acting companies, teams are no longer geographically co-located but staffed just-in-time. The decrease in personal interaction combined with the plethora of tools used (E-Mail, IM, Skype, Dropbox, LinkedIn, Lync, etc.) create new attack vectors for social engineering attacks. Recent attacks on companies such as the New York Times, RSA, or Apple have shown that targeted spear-phishing attacks are an effective evolution of social engineering attacks. When combined with zero-day-exploits they become a dangerous weapon, often used by advanced persistent threats. This paper provides a taxonomy of well-known social engineering attacks as well as a comprehensive overview of advanced social engineering attacks on the knowledge worker.

References

  1. Anatomy of an attack. available online: http://httpblogs.rsa.com/anatomy-of-an-attack/, last accessed on 2013-07-17.Google ScholarGoogle Scholar
  2. Google hack attack was ultra sophisticated. available online: http://www.wired.com/threatlevel/2010/01/operation-aurora/, last accessed on 2013-07-17.Google ScholarGoogle Scholar
  3. Microsoft hacked: Joins apple, facebook, twitter -- InformationWeek. available online: http://www.informationweek.com/security/Attackacks/microsoft-hacked-joins-apple-facebook-tw/240149323, last accessed on 2013-07-10.Google ScholarGoogle Scholar
  4. The robin sage experiment: Fake profile fools security pros. available at http://www.networkworld.com/news/2010/070810-the-robin-sage-experiment-fake.html?t51hb, last accessed on: 2013-07-14.Google ScholarGoogle Scholar
  5. Whatsapp. available online: http://www.whatsapp.com/, last accessed on 2013-07-18.Google ScholarGoogle Scholar
  6. L. Alvisi, A. Clement, A. Epasto, S. Lattanzi, and A. Panconesi. Sok: The evolution of sybil defense via social networks. IEEE Symposium on Security and Privacy, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Bader, A. Anjomshoaa, and A. Tjoa. Privacy aspects of mashup architecture. In Social Computing (SocialCom), 2010 IEEE Second International Conference on, pages 1141--1146, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, pages 422--441. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Ballagas, M. Rohs, J. G. Sheridan, and J. Borchers. Byod: Bring your own device. In In Proceedings of the Workshop on Ubiquitous Display Environments, Ubicomp, 2004.Google ScholarGoogle Scholar
  10. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, pages 551--560. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93--102. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware spam. In Proceedings of the 2008 ACM conference on Computer supported cooperative work, CSCW '08, pages 403--412, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys '11, pages 239--252, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Cialdini. Influence: science and practice. Allyn and Bacon, 2001.Google ScholarGoogle Scholar
  15. P. F. Drucker. Landmarks of tomorrow: a report on the new "post-modern" world. Harper, New York, 1st edition, 1959.Google ScholarGoogle Scholar
  16. S. Granger. Social Engineering Fundamentals, Part I: Hacker Tactics. SecurityFocus, 2001.Google ScholarGoogle Scholar
  17. N. Gruschka and M. Jensen. Attack surfaces: A taxonomy for attacks on cloud services. In IEEE CLOUD, pages 276--279, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. Herley and D. Florencio. Phishing as a Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa. Towards automating social engineering using social networking sites. In Computational Science and Engineering, 2009. CSE'09. International Conference on, volume 3, pages 117--124. IEEE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, and E. Weippl. Social snapshots: digital forensics for online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Huber, M. Mulazzani, S. Schrittwieser, and E. Weippl. Cheap and automated socio-technical attacks based on social networking sites. In 3rd Workshop on Artificial Intelligence and Security (AISec'10), 10 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch. Friend-in-the-middle attacks: Exploiting social networking sites for spam. IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 5 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 55--74, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10): 94--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. K. Krombholz, D. Merkl, and E. Weippl. Fake identities in social media: A case study on the sustainability of the facebook business model. JoSSR, 4(2): 175--212, 2012.Google ScholarGoogle Scholar
  26. K. Marett, D. Biros, and M. Knode. Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. lecture notes in computer science, 3073: 187--200, 2004.Google ScholarGoogle Scholar
  27. K. Miller, J. Voas, and G. Hurlburt. Byod: Security and privacy considerations. IT Professional, 14(5): 53--55, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Mitnick and W. Simon. The Art of Deception: Controlling the Human Element of Security. Wiley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl. Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 5--5, Berkeley, CA, USA, 2011. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Nelson. Methods of Hacking: Social Engineering. online, 2008. available at: http://www.isr.umd.edu/gemstone/infosec/ver2/papers/socialeng.html, last accessed on 2013-07-04.Google ScholarGoogle Scholar
  31. K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram. Phishing for the truth: A scenario-based experiment of users' behavioural response to emails. In L. Janczewski, H. Wolfe, and S. Shenoi, editors, Security and Privacy Protection in Information Processing Systems, volume 405 of IFIP Advances in Information and Communication Technology, pages 366--378. Springer Berlin Heidelberg, 2013.Google ScholarGoogle Scholar
  32. N. Perlroth. Chinese hackers infiltrate new york times computers, Jan. 2013. available at https://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html, last accessed on: 2013-07-01.Google ScholarGoogle Scholar
  33. R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang. Plagiarizing smartphone applications: attack strategies and defense techniques. In Proceedings of the 4th international conference on Engineering Secure Software and Systems, ESSoS'12, pages 106--120, Berlin, Heidelberg, 2012. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. T. Qin and J. Burgoon. An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Intelligence and Security Informatics, 2007 IEEE, pages 152--159, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  35. J. C. Roberts, II and W. Al-Hamdani. Who can you trust in the cloud? a review of security issues within cloud computing. In Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD '11, pages 15--19, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Schrittwieser, P. Fruehwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. Weippl. Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications. In Network and Distributed System Security Symposium (NDSS 2012), 2 2012.Google ScholarGoogle Scholar
  37. SocialEngineer. What is phishing -- paypal phishing examples. available online: http://www.social-engineer.org/wiki/archives/Phishing/Phishing-PayPal.html, last accessed on 2013-07-04.Google ScholarGoogle Scholar
  38. Sophos. Sophos facebook id probe shows 41% of users happy to reveal all to potential identity thieves, 2007. available online: http://www.sophos.com/en-us/press-office/press-releases/2007/08/facebook.aspx, last accessed on 2013-07-13.Google ScholarGoogle Scholar
  39. S. Stasiukonis. Social Engineering, the USB Way. 2006. available at http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID=208803634, last accessed on: 2013-07-02.Google ScholarGoogle Scholar
  40. L. Tam, M. Glassman, and M. Vandenwauver. The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol., 29(3): 233--244, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. H. Thompson. The human element of information security. Security Privacy, IEEE, 11(1): 32--35, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Social engineering attacks on the knowledge worker

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
          November 2013
          483 pages
          ISBN:9781450324984
          DOI:10.1145/2523514

          Copyright © 2013 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 26 November 2013

          Check for updates

          Qualifiers

          • invited-talk

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader