Wednesday, December 9, 2015

Ho! Ho! Ho!…Hold on (Week 2)



Social Media Awareness


‘Tis the season to be merry and enjoy family, stuff our faces with food and for those legally able to, drink some eggnog or whatever concoction we cherish. It’s certainly the age of ‘selfies’, hashtags (#), tweeting and checking in. The movie Home Alone was one of my favorite movies. The burglars waited till the home owners left for vacation and then tried to break in. Of course the movie has them fail miserably at this but the point is, before technology, cat burglars had to physically scope a target. We do this job for them by publicly sharing this information without hesitation.

            Social media is a great tool to have personally and even as a business as it can be used as a ‘free’ marketing tool. I stay in touch with my family and friends who are thousands of miles away via Facebook. They post photos and I post photos and we like each other’s photos; the cycle goes on and on. The downside with social media sites is that they make money off of having as many users as possible share information; Privacy and Security are a second thought. The more connected they can get their users the better for them. How does someone have over 1,000 friends? How do you keep up with all these relationships? If you post a picture, not only does the 1,000 friends have access to these pictures but also their 1,000 friends (if you haven’t locked down your account). That means about a million ‘strangers’ could potentially view that picture you just posted. In terms of marketing this is great, because if you like a product and share it, potentially a million people will view it and there’s a chance that a sale may come out of this. As an individual though, would you like to have a million eyes staring at your body since you decided to flaunt your new body ink?

Data shows 93% of hiring managers will review a candidate’s social profile before making a hiring decision. And that review matters: 55% have reconsidered a candidate based on what they find, with most (61%) of those double-takes being negative.” (Davidson, 2014)
So not only should we be worried about sharing personal pictures and information to strangers but this can also hurt our careers.

How can social media be used to propagate an attack?
Let’s walk through some basic information gathering (recon) and possible spear phishing based on a ‘fictional’ post that was posted by the HR manager at company ABC. On her social media page she posted a picture of a soccer game and stated #GoBruins #MyDaughterRocks. Typical stuff that any proud parent would post on social media. No harm there. As the Human Resources manager, Jane Doe has some information posted on her social media about page stating her title at company ABC and her privacy settings are not that strict, friends of friends can view her profile page. Her LinkedIn page is also tied back to her other social media accounts like Facebook and Twitter.

While doing recon on company ABC, bad-guy Joe used Metagoofil. (Information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belonging to a target company. Metagoofil will perform a search in Google to identify and download the documents to local disk and then will extract the metadata with different libraries like Hachoir, PdfMiner? and others. With the results it will generate a report with usernames, software versions and servers or machine names that will help Penetration testers in the information gathering phase.)

The HR manager stood out to him based on the access she would have to personal employee information (PII) within the targeted company. Through online stalking, bad-guy comes across the post talked about earlier. By copying the image and using metapicz, some information is gathered like the date the picture was taken. Images usually contain information (metadata) like the camera used, what application was used, even location the picture was taken.

Bad-guy Joe also used Google reverse image search capability to get some more information about this picture. Using this, bad-guy Joe can see that the soccer match was played at Tranquility Park. (See figure 1.1)

Note that there are other powerful metadata extraction tools like ExifTool that can be used to pull even more information.

Figure 1.1



Figure 1.2
Now that bad-guy Joe has this information, it’s time to craft a targeted email (spear phishing email) that can deliver a malicious payload. Before the email is crafted though, to ensure the exploit has a higher chance of success, bad-guy Joe scans through Jane Doe’s social media page again and runs into a post talking about the Internet browser and computer that she uses (IE 11 and she is running Windows 10 – See figure 1.2)    

Now the email can be sent with a ‘legitimate’ message and the embedded exploit is specific to the Operating System Jane Doe uses.

Figure 1.3




























How to stay safe on social media

Is it time to pull out the Kodak and order some film?
Not necessarily, social media is here to stay and as much as staying away from it entirely would be the best way to avoid its pitfalls, there are basic steps that we can take to avoid sharing too much.

  1. Configure your privacy and security settings. Lock down your social media accounts as much as possible. You really don’t have all those friends, it’s probably time to cut back on the attention.
  2. Question before you post. Ask yourself what you would lose if you posted that picture or tweeted that post. Think about it before sharing. Yes, now you can edit posts and even deleted pictures but are you 100% positive someone did not already take a screenshot!!?
  3. Less is more. The whole world does not need to know about your day to day life we have TMZ and the gossip magazines to keep us busy. The less information you share the less likely someone can map out your life.
  4. Mirages are real. Approach everything with caution and doubt, yes that single lady on christianmingle.com may not be so Christian after all. Online profiles can be sprung up and made to be whatever you fancy. Be careful what you trust on the net. Pictures of friends and family can be used to create fake profiles to dupe you.
  5. Security through obscurity. There are no rules that say you have to use your real name out there. Sometimes using aliases may help keep that CEO out of the social media limelight.


As we enjoy family and friends, we need to be vigilant and aware of what we are posting online.

I will borrow a leaf from the National Cyber Security Awareness Month (NCSAM) – celebrated every October – they highlighted the campaign theme STOP. THINK. CONNECT and the capstone concepts of the campaign are:
  • Keep a Clean Machine
  • Protect Your Personal Information
  • Connect With Care
  • Be Web Wise
  • Be a Good Online Citizen


  
References
Tutorial: Metadata Analysis. (n.d.). Retrieved December 9, 2015, from http://fotoforensics.com/tutorial-meta.php

Davidson, J. (2014, October 16). The 7 Social Media Mistakes Most Likely to Cost You a Job. Retrieved December 9, 2015, from http://time.com/money/3510967/jobvite-social-media-profiles-job-applicants/



1 comment: