Learning Library

← Back to Library

Social Engineering: Greed, Fear, Phishing

Key Points

  • Humans are the weakest link in security, so attackers often use social engineering—exploiting greed or fear—to compromise targets.
  • Successful attacks start with extensive intelligence gathering from sources like social media, LinkedIn, and company websites to personalize the lure.
  • In a spear‑phishing scenario, attackers fabricate a targeted email (e.g., promising a laptop upgrade) that appears to come from a trusted domain and uses tricks such as typo‑squatting to deceive the victim.
  • By tailoring the message to the victim’s role, desires, and known contacts, attackers increase the likelihood of credential theft, system takeover, or theft of intellectual property.
  • The presentation outlines three attack goals—stealing credentials, gaining system control, and exfiltrating intellectual property—demonstrating how each can be achieved through tailored social‑engineering tactics.

Full Transcript

# Social Engineering: Greed, Fear, Phishing **Source:** [https://www.youtube.com/watch?v=uMkOphesrqI](https://www.youtube.com/watch?v=uMkOphesrqI) **Duration:** 00:14:53 ## Summary - Humans are the weakest link in security, so attackers often use social engineering—exploiting greed or fear—to compromise targets. - Successful attacks start with extensive intelligence gathering from sources like social media, LinkedIn, and company websites to personalize the lure. - In a spear‑phishing scenario, attackers fabricate a targeted email (e.g., promising a laptop upgrade) that appears to come from a trusted domain and uses tricks such as typo‑squatting to deceive the victim. - By tailoring the message to the victim’s role, desires, and known contacts, attackers increase the likelihood of credential theft, system takeover, or theft of intellectual property. - The presentation outlines three attack goals—stealing credentials, gaining system control, and exfiltrating intellectual property—demonstrating how each can be achieved through tailored social‑engineering tactics. ## Sections - [00:00:00](https://www.youtube.com/watch?v=uMkOphesrqI&t=0s) **Social Engineering: Exploiting Human Weakness** - The speaker explains how attackers target humans via social engineering—using greed or fear—to compromise credentials, system control, and intellectual property, beginning with a spear‑phishing scenario. - [00:03:07](https://www.youtube.com/watch?v=uMkOphesrqI&t=187s) **Typo Squatting Phishing Prevention** - The speaker explains how typo‑squatting attacks lure users to a fake login page to steal credentials and recommends using a secure DNS service such as Quad9 (9.9.9.9) to block access to known malicious sites. - [00:06:16](https://www.youtube.com/watch?v=uMkOphesrqI&t=376s) **Phishing Leads to Remote Access Trojan** - The speaker explains how a deceptive “free disinfection tool” download tricks users into installing a Remote Access Trojan, giving attackers full control, and stresses prevention through secure DNS filtering and user education. - [00:09:21](https://www.youtube.com/watch?v=uMkOphesrqI&t=561s) **Deepfake Voice Scam Preparation** - The speaker details extracting a conference video of a target, training a deep‑fake voice model from it, and using the resulting synthetic audio to call the target’s administrative assistant while impersonating the victim. - [00:12:27](https://www.youtube.com/watch?v=uMkOphesrqI&t=747s) **Voice Deepfake Leads to $35M Loss** - The passage recounts a real bank breach where AI‑generated voice impersonation fooled an employee into sending confidential data, and it outlines preventive steps such as user education, multi‑factor verification, and strict policies against sharing sensitive information via personal channels. ## Full Transcript
0:00Humans are the weakest link in any security system. 0:03So if I'm a bad guy, why wouldn't I go ahead and hack the human instead of trying to figure out some technically complex way of breaking in? 0:11Well, in fact, we call that social engineering, this hacking of humans. 0:15And it many times relies on two different underlying motivations that we're going to exploit in human psychology. 0:22And that is that people are largely driven by greed or the desire to get something, or they're motivated by fear. 0:32And in some of these cases, we'll use both, but in some cases only one or the other. 0:37I'm going to take you through three different scenarios where we are going to compromise credentials. 0:45We're going to compromise control of the system, and we're going to compromise intellectual property of an organization. 0:52Three different social engineering attacks. 0:54Let's get into the details. 0:57Okay, in our first scenario, we're going to compromise credentials. 1:01That is the user ID and password you use to log into a system. 1:04And something that makes for a successful human hack-- or social engineering attack 1:09--is if you've done your homework in advance. That is, you've gathered intelligence and done research on your victim. 1:17So where would you do that? 1:19Well, you might look at places like social media-- Facebook, like LinkedIn, like Google 1:25--and things like that to find out as much as you can about your intended victim. 1:30In this example, we're going to do what's known as a spear phishing attack 1:33where we're going to send a phishing email, but it's very, very targeted because I've done this intel. 1:38And that's why it's more successful, because the generic stuff, people will kind of ignore. 1:44So I go to these sources and out of that I'm able to ascertain the organization that my victim works for, 1:50their email address. I'm going to get the title that they have within the organization. 1:58I might find out other things like who their administrative assistant is--other things like that. 2:04A lot of information is online and it's all going to come in useful. 2:08Now, what I'm going to do from that, is harvest some of that information and take advantage of it. 2:13So let's say our victim has had a laptop issued to them by the company. 2:18That's really old and they're really looking forward to an upgrade. 2:21So they're looking for it. 2:23Maybe not greed, but something they're hoping to get out of this. 2:27They want a laptop upgrade. 2:29So what I'm going to do is if I'm the attacker, I'm going to craft an email to them. 2:34And in the email I'm going to send it to this information that I got. 2:39I'm going to make it from an address based upon the organization's domain name, and I might even address it to their title and so forth. 2:49I'm going to put it in here as a subject that it's for your new laptop. 2:57And all you have to do is click on the link in here for some website; let's say this is the website, example.com. 3:06But notice I left the "e" out. 3:08This is typo squatting. 3:09This is where I get something that close and maybe no one notices a difference. 3:13But it's close enough. 3:14And I tell the victim, click on this link to log in and confirm your order. 3:19And when they do that, they click on the link and they end up at the hacker's website. 3:25And there it asks for their user ID and their password and click "Yes" to confirm your order. 3:33They enter the information. 3:35They think they're getting a new laptop. 3:37What in fact happened was, we just stole their user ID and password 3:41and added it to the hacker's database, where then they can come back in and log in and export all kinds of information from them. 3:49Now, what could we have done to prevent this? 3:52What would be a solution? 3:53So you're going to find that there are some common solutions in these cases when we're talking about social engineering. 4:01In this case, one of the things that would have helped is if we could have blocked him going to that website in the first place. 4:07And the solution we have for that is a secure DNS. 4:12And the capability I'm going to refer to is called Quad9. 4:15Quad9 is a capability that's free. 4:17All you have to do is change your DNS, that is your domain name setting in your browser, 4:22or in your IP stack on your system and set it to four 9 [9.9.9.9]. 4:29And when you do that, it has a blacklist, and it looks for some of these known bad sites and will keep you from going there in the first place. 4:36So that could have prevented the person from getting there in the first place. 4:39What's something else we could do? 4:41Well, we really need to, if you think about this, this is an attack on the human, on their psychology, on their mind. 4:48So there's where we need to put a lot of our defenses. 4:50We need to do better user education. 4:54We need to let them know that this kind of scenario can happen so that they're expecting it. 4:59And ultimately, we've got to enforce these critical thinking skills. 5:03Make people think, not just act. 5:07In the first attack, we took advantage of the notion of greed or trying to offer them something. 5:12And this next one, we're going to go with fear. 5:15And sometimes fear is an even more powerful motivator. 5:18In this case, 5:19I'm going to ultimately try to get control over the user system. 5:22So the bad guy over here is going to again do his research. 5:29Again, gather the intel, find out the person's phone number, the victim's phone number. 5:34And here's our victim here. 5:37And he's going to get all of this information. 5:39The more he has on the individual, the more convincing he will be when he calls them up. 5:44And that's what he's going to do next. 5:46He's going to call the victim and say, "I'm from a particular computer software company. 5:53And we have detected that there is malware on your system and it's going to do great damage to you. 5:58It's going to wipe out all your files. 6:00It's going to, you know, do harm to generations yet unborn." And this is the motivation. 6:06And there's a sense of urgency that we also add to this. Urgency with fear or greed becomes a multiplier. 6:12So we want to put that urgency in if we're a social engineer. 6:16So he's going to say, "What I want you to do is I need you to go to your computer." 6:22So here's the guy's computer and he's going to go in here and this guy is telling him-- 6:30the attacker is telling the victim --you need to go download special software. 6:35"I've got some software from your system. 6:37Come over here to my site. 6:39Download this free disinfection tool. 6:42This will get rid of all your problems and it won't cost you anything. 6:45Life will get better for you." 6:47He downloads the software and puts it on his system. 6:50Now what happens is it turns out what he was downloading was not making things better, it was making it worse. 6:56In fact, what he downloaded is what we refer to as a RAT: a Remote Access Trojan. 7:02Now, the bad guy has complete control over this user system. 7:07They can log in to that system and do anything as if they were right on the system. 7:12They can steal all of the information of theirs, all of the files, erase all of the files, get into the email, all of this kind of stuff. 7:19So very damaging. 7:21And in fact, this is a very, very common scenario. 7:24A lot of people have fallen for because of fear and because of the sense of urgency. 7:29What can we do to prevent this? 7:30Well, some of the things that would help. 7:32The same things I mentioned before. 7:34If we had a way to block a bad site like this and we knew in advance-- 7:39the secure DNS would keep this user from accidentally downloading the bad software. 7:45If we train the user, this is a scenario everyone should know about. 7:48And that's what we're doing right now, is making you aware of that. 7:52Then they're less likely to fall for that. 7:54It turns out software companies don't call you up and tell you you've got malware on your system. 7:58It doesn't happen. 7:59If someone calls, hang up. 8:02And the other thing is, again, develop those critical thinking skills. 8:06We need people to question things and not just react, even if it seems like the sense of urgency is trying to get us away from that. 8:15It's trying to remove any thought that we put in and just get us to operate at the brainstem level-- sheer reaction. 8:23And then another thing that we could add in here that might help is a technical measure called multi-factor authentication. 8:30Multifactor authentication would make it so that not just entering a user ID and password would get this guy into the system, 8:36but maybe it would require another form of authentication. 8:40Something that you have, something that you are. 8:43Now depending on the nature of the way this RAT works, that may or may not help, but it certainly can help in preventing other types of attacks. 8:53In our final scenario, we're going to really amp it up on the fear side and the urgency side. 8:59And we're going to really use some technology to enhance all of that and make it even seem more real. 9:04In this case, what we're going to do is we're going to steal some corporate IP. 9:08That's what we're after, intellectual property. 9:11So how are we going to do that? 9:13We're start off with our bad guy down here, and one of the things he's done is, again, the intel phase. 9:19He's gone out and searched all of this. 9:21But, you know, one of the things he found in all of this was that this individual, our victim, 9:26is going to be presenting at a conference, or attending a conference, that is at a specific date and time. 9:33So he knows the person's going to be out of the office. 9:36Another thing that this guy did in the meantime was he did some search on the web and found an instance 9:43where there was a video of our victim doing a presentation at a conference, similar type of event. 9:51He's going to take that and feed it into a form of artificial intelligence, AI, known as a deepfake generator. 9:59The deepfake will take the information out of this video. 10:03In this case, we're going to strip out the audio and train its language model 10:08so that it can then produce an audio file that sounds like this individual, our victim. 10:16It will sound almost exactly like them. 10:18To the extent that someone might not be able to tell the difference. 10:21And with that, then we can put words in that person's mouth. 10:24So I can type up text and say, run that through this particular voice simulator. 10:30And what comes out will sound like that person said something that, in fact, they never said. 10:35So there's the big setup. 10:36Now, what are we going to do? 10:38What we're going to do is we're going to set this up so that we can make a call to this individual's administrative assistant, 10:47which was also some information I got out of intel. 10:50I found out their phone number, and now I'm going to place a call. 10:53Except the call I'm going to place is going to go straight to their voicemail. 10:57Now, how would you do this? 10:58Well, you could do it by calling after hours, or you could do it if you know when they normally go to lunch, 11:03or they're actually tools you can use that will allow you to bypass the ringing and have it go straight to voicemail. 11:10Those tools already exist. 11:12So what I'm going to do as the bad guy, is generate this message and I'm going to have it go off and call this person's voicemail. 11:21And in the voicemail, I'm going to put a very urgent message. 11:24I'm going to say, "Look, this is me", and whoever me is and say "I'm at the conference, as you know, and something really terrible happened. 11:34I lost my phone. 11:35That's why you see this call coming in from another number I had to use. 11:39I had to borrow someone else's phone. 11:41But I'm in real trouble right now. 11:43And I need your help. 11:44I need you-- since I also don't have my laptop with me. 11:49I need you to give me access to a file." Those sales figures, those product plans, whatever the intellectual property has that the attacker is after, 11:57"I need you to send that to my personal email account, because if I don't get that within the hour, I lose my job. If I lose my job, guess what? 12:07You lose your job too. 12:09So this is to save our jobs. 12:11You've got to act on this right now. 12:13Don't even stop to think." That's the urgency. 12:16And in that message on the voicemail, I'm going to also tell them the name of a personal email account. 12:24But it's going to be the hacker's email account. 12:27It's not going to be the other person. 12:29This person, if they're sufficiently motivated and convinced because it sounds like their boss, they know the boss is at the conference. 12:37So this all sounds very plausible. 12:39And it sounds plausible because this guy did his research, 12:43and then aided by some AI technology, is able to simulate the voice of the ultimate victim. 12:50And this person then complies, sends the information, the confidential company information off to the bad guy. 12:58And now the information has been leaked. 13:00This is not just hypothetical, it actually happened. 13:03There was a bank that lost $35 million where someone was exploiting this exact kind of scenario and imitating the voice of an executive. 13:12Now, what could we do to prevent this, because we're about solutions? 13:15Well, in this case, the secure DNS wouldn't help because it wasn't a website we were going to. 13:20But certainly user education would help. 13:22People need to know just because you heard something doesn't mean it's necessarily real. 13:27You have to have the critical thinking skills to verify this. 13:31Maybe call the person back. 13:33Verify through another means so that you know that in fact the story is true. 13:37And ultimately be trained-- under no circumstances, 13:40I don't care who is asking me to --I'm not sending confidential information to a personal email account. 13:47I don't care what the justification is because that will get me fired for sure. 13:52So these are the kinds of technologies that can help. 13:55In many cases, though, if you think about it, it's not just about technology, it's about the user. 14:01Unfortunately, no one has invented a firewall for a human mind. 14:05If there was one, we could get it installed, 14:07and then all we'd have to do is update the policy in everyone's head every time we found out about a new social engineering attack. 14:13It's not that simple, obviously. 14:14But hopefully you understand now, a social engineering attack is really not so much an attack on the system. 14:21It's an attack on the individual. 14:23And human psychology has certain weaknesses to it. 14:26So what do we need to do? 14:27In some cases, we can use technological means in order to thwart the attack. 14:32But in most cases, it's going to be things like this where we're getting into the human mind 14:38and trying to train them against this, make them strong against what otherwise would be this sort of vulnerability. 14:47Thanks for watching. 14:48If you found this video interesting and would like to learn more about cybersecurity, please remember to hit like and subscribe to this channel.