Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

When an outsider becomes a malicious insider

Paraphrasing what long-time penetration tester and computer security author Ira Winkler once told me, “When I do penetration tests, if I can’t get in by technical means I can always get in with social engineering.” While this may sound like advice to a fellow computer security specialist, or a warning to a network manager, it should also sound warning bells to anyone who uses a computer. By social engineering an outsider becomes a corporate insider, with all the authorities and risks.

The subject of this article started formulating about a month ago when a family member called me. Long story short, he related a story of a cold call supposedly from a major known computer software vendor telling him he was infecting the Internet and walked him through some trouble shooting. They then offered to tell him how to repair it for a few hundred dollars. Luckily he said, “I’ll just take it over to Ken, he does it for a living.” Yeah, they weren’t happy with his reply.

On Friday the 23d of May, I overheard a similar story from an older lady at my local computer repair shop. I had to step in, had to make apologies to the clerk, but I felt it my duty to help out here. Unfortunately she wasn’t as lucky and had provided them her credit card number. After telling her to contact the credit card company, I knew that this problem was becoming bigger in my area.

This is an older technical support scam. This has been flowing around Europe and Asia for close to 10 years now. Yes, when you look at your events logs, there will ALWAYS be errors there. No, you don’t need to pay someone hundreds of dollars for this. Most of these errors are harmless network issues, some may need a local repair shop to fix, but NEVER provide your card to someone on the phone for this type of service.

These were individual attempts to dupe computer users into handing over information or access. The problem of outsiders gaining access as insiders increases exponentially in cases like the recent major online auction site that reported its f corporate accounts were attacked. Their somewhat cryptic announcement provided no real technical information so I had to read between the lines. The attack could have been malware or exploit, or social engineering. But regardless of how the malicious actor got in, he or she becomes your insider and has all the permissions of that account.

As Paul Asadoorian discussed in his blog post Detecting Snowden—the insider threat, there are ways of detecting and mitigating this type of compromise. While this also takes on criminal investigation elements, if we can start with the basics--monitor what has occurred and been done--attribution can then be further refined and presented to the proper authorities. In the case of the online action site, I sure hope they were monitoring and logging account activity.

While it doesn’t seem like much, at the end of the day being aware that there are people who will lie to achieve their goals for criminal activities is the start of a good computer security awareness and life lesson. To help in visualizing and predicting likely attack paths, I encourage you to read more in the whitepaper.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training