When an employee falls victim to a social engineering attack, what steps can organizations take to improve their cybersecurity posture and prevent the attack from doing further damage?
Social engineering is the set of actions threat actors use to convince individuals to divulge information that can be used to execute a cyberattack or commit fraud. Techniques include using deception, social pressure, trickery, and manipulation to get targets to let down their guard and, ultimately, compromise security. Threat actors use these techniques to gain access to accounts, transfer funds, and compromise information and systems via email, phone calls, and messaging.
Social engineering attacks are lucrative – and sometimes easy. Even in organizations with a mature security posture, it often is easier to convince a human to bypass security controls rather than to attack the organization directly.
To remain resilient in a rapidly changing threat landscape, organizations first need to identify critical areas of vulnerability. Then, in addition to implementing common preventive measures, such as user education and antiphishing email filters, organizations should develop effective security policies and processes to mitigate the consequences of successful social engineering attacks.
Robust policies and processes are the best option for providing a backstop against the damage successful attacks can do. They can help prevent or diminish the financial or confidentiality impacts of successful social engineering attacks. Policies and processes designed to limit those impacts are an important part of a defense-in-depth approach to securing an environment.
Although organizations have different threat profiles, they all have workflows that are vulnerable to social engineering attacks, so best practices will differ from organization to organization. When considering how and where to implement social engineering-resistant processes, organizations can start by evaluating three common areas of vulnerability:
Finance departments represent a common target for social engineering attacks. These departments are vulnerable to compromise because they have direct access to the organization’s funds and generally issue external payments daily.
Frequently, attacks targeting finance departments come in the form of phishing emails or phone calls regarding fraudulent invoices, updated banking information for a vendor, or missed payments. Threat actors use the names or even invoice numbers from third-party vendors. They can obtain this information by compromising the vendor’s email account via social engineering calls or publicly available information. When these social engineering attacks take the form of an email, they often come from lookalike domains that appear remarkably similar to the legitimate vendor’s email domain.
A second form of social engineering attack aimed at finance departments involves threat actors impersonating high-level executives and demanding, with great urgency, the transfer of funds. These attacks range from obviously fake requests for gift cards to convincing deepfake audio or video calls. While these attacks can be very convincing – and targets are often fooled into handing over information – organizations can implement simple, effective processes to foil them.
For example, organizations can maintain a list of trusted contact numbers for vendors or internal employees with the power to authorize payments and require that any change of payment information or new payment information must be validated via an outbound call to the number on file for the requestor, no matter how the original request is received.
Changing or bypassing existing access controls is another frequent objective of threat actors in social engineering attacks. These attacks might come in the form of requests to register or join new devices on cloud-based device management applications, requests to replace or add multifactor authentication devices, requests to increase permissions on an account, and requests to reset passwords.
The most frequent targets of these attacks are IT help desks and IT admins, depending on the objectives of the threat actor and the structure of the organization. When targeting help desks, threat actors rely on at least three specific factors. First, IT help desks often have far-reaching permissions to make changes for users. Second, help desks frequently need to make changes for users quickly in situations such as lost or broken devices, forgotten passwords, and account lockouts.
Third, and perhaps most importantly, help desks and IT admins are particularly vulnerable to social engineering because of the pressures and psychological aspects of their roles. Help desk employee key metrics are most often based on the satisfaction of their users and the time required to resolve issues. Social engineers exploit this pressure by knowing that help desk employees do not want to upset callers and by focusing on time-sensitive issues that need to be resolved as fast as possible. Further, help desks and IT admins generally work in a part of an organization’s hierarchy in which upsetting management or causing delays with ongoing projects can be stressful.
Any policies put in place to limit the impact of successful social engineering attacks targeting help desks and IT admins must keep the job pressures and psychological aspects of these roles in mind. Help desk employees must be aware of the policies and procedures in place and understand that they will not be penalized for adhering to organization policies, even if that adherence causes issues with legitimate requests.
Organizations can implement a variety of different policies to protect help desks and IT admins, including:
Organizations should establish a tracking method for denied requests. Threat actors often call help desks multiple times to request additional information they need to obtain or to connect with someone who will bypass the existing policies for them. Having a tracking method for these events – which can be as simple as a group chat for help desk techs and supervisors for small organizations or ticket correlation logic for larger organizations – can help stop these attacks. Additionally, tracking can help identify if there are any recurring pain points with legitimate requests affected by these policies.
Sometimes rather than attempting to gain network access to the data they are after, threat actors will simply ask for it. Requests might come from compromised accounts, spoofed emails or phone numbers, or lookalike domains. Threat actors often impersonate a high-ranking employee asking for data quickly for an urgent matter, such as an email from upper executives requesting data urgently be sent to them for an upcoming meeting. Once again, the sophistication level of these phishing attempts ranges from obviously fake, nonpersonalized emails sent from free, online email providers to well-researched, personalized emails from lookalike domains.
Threat actors are after a wide variety of information with these attacks. Some examples include:
When considering potential policies to limit the impact of impersonation attacks, organizations should review methods of data exchange that work well with existing processes. Ideal policies allow strong controls that intentionally limit who can access the data and how it is accessed with independent request validation.
In many organizations, unfortunately, the go-to method for exchanging information is through email attachments. This method poses several issues, such as notification requirements from email syncing during email compromises, poor tracking of access to data, and, most relevant to social engineering attacks, improper recipient validation, which can lead to sensitive data transfer to threat actors.
Disallowing sharing sensitive information via email and requiring use of secure file exchange services can help reduce multiple risks, including the risk of data acquisition via social engineering. When evaluating file-sharing services to implement, organizations should seek reputable services that allow for clear restriction to internal accounts; targeted, account-based access for external accounts (not “anyone with the link” sharing); the ability to revoke or rescind access; and the ability to audit access events. Data loss prevention solutions can be a powerful tool to help prevent egress of sensitive data outside of the organization.
To establish effective security policies and processes, organizations can take the following actions.
Social engineering attacks can have tremendous and wide-ranging impacts. Organizations can – and should – develop and enforce robust security policies and processes to protect against the various methods threat actors use to compromise their targets and to prevent negative financial consequences and breaches of confidentiality.
Developing security policies and processes is one layer of security, but implementing a holistic, defense-in-depth model can establish multiple safeguards at every stage of a potential attack chain. In addition to helping organizations respond to social engineering attacks, such models can improve and mature an organization’s holistic security posture and mitigate the risk of compromise.