As a call center manager, I'm worried that our agents could be duped by social engineering attacks like GoDaddy...
was recently. We just don't have the budget for security training for our agents, but what can we emphasize internally to identify phone phishing?
The social engineering scam on GoDaddy was part of a multistep attack to steal Naoki Hiroshima's valuable @N Twitter handle. The attacker started by calling the provider of Hiroshima's personal domain name (GoDaddy) and, using information he had collected prior, tricked the employee into redirecting the target's emails to the attacker. While the attacker didn't have all of the data needed to prove he or she was the legitimate account holder, the support person allowed the attacker to guess some of the information and was duped into believing the hacker. Once the email was redirected, the attacker used a password reset to gain access to Twitter and other accounts which would be used as part of the extortion.
The method the attacker used with the GoDaddy employee is called pretexting. Pretexting received a lot of attention when a corporate investigation at Hewlett-Packard Co. went awry in 2006. CNN offered a number of tips following the investigation that are still applicable today and can also protect a call center employee from being duped.
Perhaps the easiest additional control enterprises can put in place to limit access to an account would be to require a password from the customer prior to making any account changes. Employees should also be instructed to not give out any information (including not telling callers what was wrong with the requested data). Properly training call center employees is critical. While it may be costly, this could pale in comparison to the potential expense of lost customers or negative press.
Ask the Expert!
Want to ask Nick Lewis a question about enterprise threats? Submit your question now via email! (All questions are anonymous.)
Dig Deeper on Security Awareness Training and Internal Threats
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.