New Threats Supplant the “Dirty Dozen”

Security organizations must adapt to new threats to enterprise assets that can come from groups and individuals who don’t need to set foot on the property, warns a leading security consultant.

Joseph E. Krull, senior manager of Accenture’s Technology Consulting Security Group, which performs security program consulting, implementation and training for a large share of Fortune 500 companies, said most companies still build their security strategy around the so-called “Dirty Dozen,” a fairly low-tech list of ploys that, although familiar enough to fans of spy thrillers, have been supplanted by new tricks, some of which are remarkably effective while being no more complex than their predecessors. The trouble is, traditional physical security defenses -- perimeter fences, lighting, vaults, badges and CCTV -- are no longer as effective because the intruder can accomplish his task by phone, email or Internet, from as far away as the other side of the globe.

Speaking at a breakout session at the 2008 Texas Regional Infrastructure Security Conference (TRISC) in San Antonio last week, Krull, who has 30 years of experience with corporate and government security, including stints with the U.S. intelligence community, outlined eight new threats that require a change in security approach that emphasizes more specific policies as well as greater education and awareness on the part of all employees.

1. Social engineering. Also known as “pretexting,” Krull says. This involves a caller misrepresenting himself as a customer, vendor or partner in an attempt to access proprietary or guarded information, including usernames and passwords. In addition to education, the best defense is a repeated security reminder than under no circumstances give out username and passwords over the phone, he said.

2. Bogus industry survey. Similar to “pretexting,” here the caller claims to be an intern from a major market research firm and will usually promise a reward of cash or a gift card in return for responses to questions regarding sales, market share, products in development and so on. Best defense, Krull says, is a policy that prohibits any employee from answering a survey without management approval.

3. Trojans, rootkits and keystroke loggers. With greater frequency, these fraud tools are coming masked as attachments, or are being embedded in JavaScript on Web sites. While many organizations have made employees are aware of the danger in opening unknown attachments, Krull said, fraudsters are getting craftier, often hoping to catch an emotionally reactive user click by using a tagline message such as “You’ve been photographed naked on the Internet!” or “Look what we’ve caught you doing!”

4. Spearphishing. This takes phishing, the practice of enticing a user to reveal sensitive information with a phony email claiming to be from a bank or credit card company, to a new level, Krull said. Although it does require some sophistication, spearphishing involves the dummying up of a fake email message from the corporate CEO, usually directing the target to “forward” sensitive company documents or material. The information, of course, is sent to the phisher. Effective prevention is an IT task, involving proper configuration of corporate mail servers, Krull said.

5. “Free” USB Drives. Krull said this low-tech technique, which can be accomplished by simply dropping thumbdrives infected with trojans and keyloggers in parking lots and building lobbies, has proved surprisingly effective. Drives can contain programming to make the PCs directly addressable, or to upload their data to pre-specified location, or initiate a denial-of-service attack. In some of Accenture’s baseline security tests, employees picked up as many as 18 out of 20 USB drives and plugged them in to their office PCs or laptops. Defense is relatively easy: prohibit use of any foreign USB drive.

6. Phony Internet Kiosks. A wireless Internet kiosk, often seen at airports and hotel lobbies, can be acquired on eBay for as little as $500, Krull said. Information thieves, buy the equipment, haul it to a public location, advertise free Internet, and capture usernames and passwords of unsuspecting users. The thieves don’t even have to provide connectivity; they can simply program the kiosk to display a 404 Error page, Krull said. What’s more, users will often continue to enter other usernames and passwords in attempts to reach other sites. After a few days, the thieves return and remove the kiosk, which now contains a trove of sensitive personal data.

7. Rogue Wireless Access. Also known as the “evil twin,” the thief sets up a wireless access point in close proximity to another public WiFi site, say at a coffee shop, airport or hotel lobby. A nearby wireless user then connects through the rogue access point, which collects all the data transmitted back and forth. Krull advised his audience, when using unsecured public WiFi, to avoid accessing sites that require passwords. Companies who know employees must access their networks from the road should incorporate two-factor authentication, he added.

8. Steal the Laptop. Lost or stolen laptops are proving to be the most costly liability in terms of information security, Krull said. Moreover, CEOs and corporate officers are now being targeted. A car break-in that results in a laptop theft may not have been the random smash-and-grab it appears to be. Thieves are going as far a casing their targets to see what type of laptop carrying case they have and purchasing the same model. After that it’s purely old school. Often using a partner, they distract the mark, switch cases and are gone. Good security defenses recognize that some laptops may indeed get stolen, and require full disk encryption, two-factor authentication and use of security tokens, Krull said.

Overall, security tools exist to help counter these intrusion threats, Krull said, but education and policy is critical in bringing defenses up to date. “There must be targeted education for senior management,” he said. “Use short sentences and small words.”

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3