Share

'Super simple' hacking tricks revealed

Cape Town - While cyber security breaches continue to make tech news headlines, experts have revealed that it is surprisingly easy to compromise individuals and companies.

This year, large corporations such as Target, Home Depot and eBay have experienced cyber security lapses as hackers appear to run riot through security protocols.

But while the breaches themselves appear spectacular, a cyber security expert revealed that simple social engineering tools are easily employed to gain unauthorised access.

"We would actually go and visit the client and we distribute USB sticks: Leave it in the bathrooms, leave it the meeting rooms; put it on the desks," Trustwave cyber security expert Leon Van Aswegen told Fin24.

Trustwave is often tasked with investigating whether a company's security is up to scratch, and through its Spiderlabs division, employs ethical hackers who test all aspects of cyber security.

Simple strategy

"On the USB is a piece of code, if you open it up... people want to do the right thing. You make it look legitimate - put your pictures on there, make it look like its personal images and the person wants to return it to you because you're going to lose your data," said Van Aswegen of how the social engineering trick works.

"As soon as a click on a folder or anything, the script runs and you know that data is lost."

But it's not only one person that can be easily compromised with a planted flash drive. People in an office keen to track the owner of a lost stick will often share the device with colleagues.


Spam remains an effective way to deliver malware to computer users. (Duncan Alfreds, Fin24)

"The funny thing is that if you start to number your devices, and this is where awareness comes in: It's not just one individual - they even share that disk, they plug into various machines and in that way you compromise not just one individual, but potentially six or seven," Van Aswegen said.

This way, even if the first individual doesn't have administrator rights to the company's server infrastructure, by sharing the harmful stick, a hacker could potentially hit on somebody that does have privileges.

But there are far more simple methods to compromise a company.

Many firms recycle paper and don't think twice about the information printed on the paper. This information can include financial statements, business proposals and even strategy.

Implementation

"If I'm a syndicate stealing information in the business of fraud, I'm going to target that driver. I'm going to offer him R10 000 a month to provide me with that information - it's as simple as that," said David Taylor of how easy it would be to target the person who collects recycled paper from corporations.

Taylor is a former associate professor of ICT law and founder of CyCaD - a cyber war NGO.

And few companies consider the integrity of third party service providers who conduct maintenance tasks in the office.

"If you have a technician who comes to service the photocopy machine, are you aware that there are still images stored on the hard drive?" Taylor added.

Ultimately, weak implementation of security protocols play an important role in making companies vulnerable to cyber security intrusion.

The 2014 Trustwave Global Security Report found that weak passwords contributed to 31% of intrusions the company investigated in 2013.

The most commonly used password was "123456", followed by "123456789", "1234" and "password".

"It is a very big problem, and I'll tell you why: People are lazy. So if your company policy says to you that you've got to use a minimum of eight characters… users themselves, because they work for the company, they don't really care," said Andrew Kirkland, Trustwave regional director for Africa.

Watch Leon Van Aswegen explain why people don't take their computer security seriously.


- Follow Duncan on Twitter

We live in a world where facts and fiction get blurred
Who we choose to trust can have a profound impact on our lives. Join thousands of devoted South Africans who look to News24 to bring them news they can trust every day. As we celebrate 25 years, become a News24 subscriber as we strive to keep you informed, inspired and empowered.
Join News24 today
heading
description
username
Show Comments ()
Rand - Dollar
19.23
-0.3%
Rand - Pound
23.91
-0.3%
Rand - Euro
20.48
-0.4%
Rand - Aus dollar
12.31
-0.1%
Rand - Yen
0.12
-0.6%
Platinum
951.10
+0.1%
Palladium
1,030.00
+0.1%
Gold
2,385.35
+0.3%
Silver
28.31
+0.3%
Brent Crude
87.11
-0.2%
Top 40
67,190
+0.4%
All Share
73,271
+0.4%
Resource 10
63,297
-0.1%
Industrial 25
98,419
+0.6%
Financial 15
15,479
+0.6%
All JSE data delayed by at least 15 minutes Iress logo
Company Snapshot
Editorial feedback and complaints

Contact the public editor with feedback for our journalists, complaints, queries or suggestions about articles on News24.

LEARN MORE
Government tenders

Find public sector tender opportunities in South Africa here.

Government tenders
This portal provides access to information on all tenders made by all public sector organisations in all spheres of government.
Browse tenders