• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

#IRISSCON: Social Engineering Testers Warned Not to Cross Ethical and Legal Boundaries

flyytech by flyytech
November 13, 2022
Home Security
Share on FacebookShare on Twitter


Professional ethical social engineering testers can sometimes cross ethical and legal boundaries, which can have significant consequences, warned Sharon Conheady, director at First Defence Information Security Limited, at IRISSCON 2022.

During her career in ethical social engineering testing, Conheady has a number of notable stories, including using an unsuspecting security guard to help her carry out a stolen computer server while in another, she posed as catering staff to exit a football stadium undetected.

Despite this testing often being clever and entertaining, Conheady warned against glamorizing this type of work, and noted there is a “fascination” with famous fraudsters of the past, such as Victor Lustig, who ‘sold’ the Eiffel Tower.

“Attackers do not abide by ethical and legal codes of conduct, but we as security professionals do need to think about it,” said Conheady.

She emphasized “there are tonnes of laws you might break” that ethical testers must be conscious of during their work.

These include:

  • Forgery and trademark infringement – for example by creating a fake website or impersonating an individual or organization in emails and documents
  • Data protection and privacy – such as recording private conversations
  • Breaking and entering – e.g. picking locks to enter buildings
  • Bribery and corruption
  • Theft of physical assets, information and identities
  • Impersonation or pretexting – especially police officers

Knowledge of local laws is paramount before undertaking any job, with Conheady noting that what’s legally acceptable in one region may not be in another.

Additionally, social engineering testers must ensure they stay within the scope of their assignment. “It’s so easy to get carried away when you do them because they’re really fun and you want to get further,” she stated, adding that social engineers tend to “egg each other on a lot.”

For example, tactics like “USB drops” can be dangerous as you don’t know where they will get plugged in – such as friends and family of an employee.

These professionals must also ensure what they are doing is safe, both for them and the client. In one case, two security professionals were jailed in 2019 for breaking into a courthouse in Iowa, US, despite being contracted to do so by the state’s judicial arm.

Although the charges were later dropped, Conheady said “it has made a lot of social engineers in the industry think twice about what we’re going to do as part of a test.”

The Iowa case shows that social engineers must ensure their contracts for this type of work are “100% iron-clad.”

Contracts should include:

  • A description of the test and the types of activities involved
  • The time window of when you’re allowed to test
  • Any restrictions and limitations e.g. are there areas/teams out of scope

They should also ensure the contract is checked by relevant departments in both the testers’ and the clients’ organizations, particularly legal and HR teams.

Social engineers should also carry around their ‘get out of free card’ in case they are caught or confronted. This card should have their name and that of other testers involved, clearly explain what they are doing there and have the names of at least two contacts within their own and target organizations who have authorized the tests.

Even where activities are legal, they are not necessarily ethical, cautioned Conheady. She highlighted several phishing email tests conducted by major organizations during the COVID-19 pandemic that were highly questionable.

For example, a phishing test email by UK train operator West Midlands Trains purported to offer a financial bonus to staff to thank them for their efforts during the pandemic, causing a lot of upset among staff when they realised it was fake.

“If you are going to send this kind of test out to your organization, be prepared for the negative publicity that is going to follow,” warned Conheady. She added that these tactics can be counterproductive if it leads to disengagement with the company and an employee backlash.

To avoid such ethical problems occurring, Conheady advised security professionals preparing a social engineering test to check with legal and HR departments first. They should also “imagine how the people involved would feel when they find out they have been socially engineered.”

Finally, Conheady emphasized that social engineering testers should understand what they’re getting into and be aware of the possible downsides.

“If you’re going to act like the bad guy, be prepared to be treated like a bad guy,” she stated.



Source_link

flyytech

flyytech

Next Post
Minecraft helps you build a better world, one tree at a time

Minecraft helps you build a better world, one tree at a time

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

These robot vacuums will always keep your home office tidy, and they’re on sale for Cyber Monday

These robot vacuums will always keep your home office tidy, and they’re on sale for Cyber Monday

November 28, 2022
How to delete your Microsoft account

How to delete your Microsoft account

February 11, 2023

Trending.

Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
Volla Phone 22 review

Volla Phone 22 review

March 26, 2023
USIU student team qualifies for Microsoft Imagine Cup World Championship

USIU student team qualifies for Microsoft Imagine Cup World Championship

April 5, 2023
Google 3D animals & AR objects: Full list & gallery

Google 3D animals & AR objects: Full list & gallery

December 27, 2022
Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

Thermalright Peerless Assassin 120 SE Review: Incredible, Affordable Air Cooling Performance

September 27, 2022

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

Mass Exploitation of Zero-Day Bug in MOVEit File Transfer Underway

June 5, 2023
Blockchain security companies tackle cryptocurrency theft, ransom tracing

Atomic Wallet hack leads to at least $35M in stolen crypto assets

June 5, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT