Psycho-hacking: Human Vulnerabilities
October 16, 2020
A few weeks ago, a 17-year-old young man was arrested by the police for being behind the hacking of more than 130 Twitter accounts, including that of celebrities such as Bill Gates, Jeff Bezos or Elon Musk. This unprecedented hacking created a stir in public opinion and highlighted, once again, the danger we face: cyber fraud.
In this case, the hackers tweeted from the hacked accounts with messages offering 2,000 dollars for every 1,000 dollars sent to an anonymous bitcoin address. These messages came from financially successful and well-known celebrities, which made the deception even more credible. I'll only be doing this for 30 minutes, some of the messages said.
Although the messages were quickly deleted, in just a few hours the hackers had scammed than $100,000. That's how easy, fast and lucrative cyber fraud can be.
By analyzing the messages, we are able to come to the conclusion that the hackers are very familiar with "social engineering" techniques.
These messages allude to various principles of persuasion:- Authority: In this case, we are more predisposed to be influenced by a person of recognized prestige, success or authority. Obama, Gates or Bezos are all people who generate that feeling of authority that "pushes" users to believe what they're saying.
- Liking: In some cases, these celebrities add the effect of likeability to their authority, by which we feel attracted to them, that we like them or identify with them, which leads to us letting ourselves by guided by their requests.
- Scarcity: We're always drawn to things that are scarce or difficult to access. We place great value on what we consider to be unique or exclusive, something the hackers achieved with the message "I'll only be doing this for 30 minutes".
When the decision is made to attack a system, hackers encounter two types of elements they have to overcome, the machine and the human being, the technical system and the cognitive system.
As we've already talked about in another post the human being is the most fragile link in the cybersecurity chain.It's easier and faster to hack into a person's brain than to hack into a computer system, which is why deploying a range of deception and persuasion strategies is more effective than trying to defeat computer programming mechanisms. We can define social engineering as any strategy that causes a person to perform an action or behavior that they wouldn't do on their own. This is precisely the definition of the term "persuasion", whose techniques are used in this type of attack in one way or another. Social engineering has a number of characteristics:
- It's based on deception, it's necessary to lie to the victim to achieve the objective.
- The victim does something that, in theory, they wouldn't necessarily do, and therefore that persuasive effect is necessary.
- The victim's action may go against their own interests.
An attack based on social engineering follows a series of phases:Information gathering
As much information as possible about the victim and their context needs to be collected in order to be able to credibly and effectively prepare the rest of the attack. This phase is very important and can last weeks or months, since it requires having in-depth knowledge of the data that allows an effective bait to be designed. For example, in the case of an attack on a Twitter employee, we'll need to know their personal data, their system privileges, the tasks they usually perform, their communication systems and the characteristics of their interactions. To this we must add information about the technical and security processes needed to carry out the attack we're planning. In this case, for example, we would need to know how to reset user accounts.
Establish a bond with the victim
Once we have all the information, we create the bait with which we earn the trust of the victim. This phase allows us to make the first contact with the victim and continue collecting information, this time going even deeper with information related to the objective of our attack. We can, for example, contact the victim through social networks or messaging services so that we become someone from their environment, from their "tribe", alluding to a term that we'll use later on. In this phase, the persuasion strategies that we've discussed above are put into motion and it ends when the victim is willing to generate the action we need from them. For example, we can contact a Twitter employee, pretending that we're a colleague of theirs, establishing a virtual friendship relationship to later use different persuasion techniques such as reciprocity or authority to make them provide us with information or grant us privileges to carry out a process in the system.
