{"id":272,"date":"2021-11-18T15:23:06","date_gmt":"2021-11-18T15:23:06","guid":{"rendered":"https:\/\/cyberphil.azurewebsites.net\/?p=272"},"modified":"2021-11-18T17:39:13","modified_gmt":"2021-11-18T17:39:13","slug":"surfing-lner","status":"publish","type":"post","link":"https:\/\/www.cyberphil.co.uk\/?p=272","title":{"rendered":"Surfing LNER"},"content":{"rendered":"\n<p>Anybody remember the classic Beachboys song \u2018Surfing USA\u2019?&nbsp; Well how about \u2018Surfing LNER\u2019 as an alternative?<\/p>\n\n\n\n<p>I am getting dismayed in my classes as my references to all time great music hits are now being met with sideways glances and silence from an audience of cyber students who are mostly in their early 20\u2019s and have no idea what I am talking about.&nbsp; <\/p>\n\n\n\n<p>I often quote lyrics from the Beachboys, Queen, Meatloaf, the Beatles and Tom Jones in my well-crafted anecdotes and witty remarks but normally have to explain the joke afterwards! Which kind of loses the point.&nbsp; However, if there are any dads out there \u2013 you will know that our jokes are the funniest on the planet, even if nobody laughs.<\/p>\n\n\n\n<p>It makes me feel old but it don&#8217;t stop me now as I&#8217;m having a good time.<\/p>\n\n\n\n<p>Luckily I removed Gary Glitter and Rolf Harris from my repertoire some time ago.<\/p>\n\n\n\n<p>I remember when I first ventured into the world of IT security many years ago (well before the time that we slapped the word \u2018cyber\u2019 in front of everything) and being taught about all of the different types of attacks ranging from application attacks, network intrusions, man in the middle and then something lovingly referred to as social engineering.<\/p>\n\n\n\n<p>Little did I know that I had been involved in the majority of these activities for over 20 years in my previous life in the military \u2013 but now I could put a label on it all!<\/p>\n\n\n\n<p>I really enjoy talking about and training people on the concepts of social engineering and could probably write a book on it \u2013 or perhaps compose a musical comedy which would have more impact \u2018The Pen-testers of Penzance\u2019?!<\/p>\n\n\n\n<p>What I really enjoy is putting together courses which decipher all the jargon of social engineering \u2013 and the really great thing is that a lot of these terms are now common knowledge:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Phishing<\/li><li>Spear-phishing<\/li><li>Whaling<\/li><li>Smishing<\/li><li>Vishing<\/li><\/ul>\n\n\n\n<p>The list is pretty endless.<\/p>\n\n\n\n<p>Then we get into the world of \u2018physical\u2019 social engineering which takes a certain element of tradecraft and bravado to pull off:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Piggy-backing<\/li><li>Tailgating<\/li><li>Impersonation<\/li><li>Dumpster diving<\/li><li>Shoulder surfing<\/li><\/ul>\n\n\n\n<p>All relatively easy concepts to understand as they pretty much do what they say on the tin.<\/p>\n\n\n\n<p>Shoulder surfing is a good one as it is often explained as someone looking over your shoulder to see what you are up to on a screen or how your hands move on a keyboard whilst typing in credentials etc.&nbsp; And you may think \u2013 \u201cHow likely is that to take place whilst I am at work?\u201d.&nbsp; The reality is of course that unless the attacker has been able to get physical access to where you are sitting (through tailgating or piggy-backing perhaps?) \u2013 then it is not likely at all.&nbsp; (Unless you work with a bunch of \u2018disgruntled employees\u2019!)<\/p>\n\n\n\n<p>However, don\u2019t know if you have noticed recently that things have changed?<\/p>\n\n\n\n<p>Technology now means that each and every one of us is equipped and has the ability to record, photograph and video at the drop of hat \u2013 whoever, whatever, whenever.&nbsp; That is what a mobile phone is for.&nbsp; More camera less phone.<\/p>\n\n\n\n<p>Life now means that more and more of us are working away from the office and we are all busy people.&nbsp;<\/p>\n\n\n\n<p>We work routinely from home, check our emails on the toilet, we answer calls in the coffee shop, we arrange video meetings on the move which unfortunately means that the social engineer no longer needs to come to us as we come to them!<\/p>\n\n\n\n<p>On a recent trip up North (where it wasn\u2019t at all grim) I was sat on a London North East Railway train doing what most people do on trains.\u00a0 Reading a book, listening to music and playing with my phone.\u00a0 Nobody raised an eyebrow at any of this.\u00a0 However, two seats in front of me was a very busy person working on that all important Teams meeting and although she wasn\u2019t talking she was typing.\u00a0 This was the view from my seat.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"270\" height=\"332\" src=\"\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161740.jpg\" alt=\"\" class=\"wp-image-274\" srcset=\"\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161740.jpg 270w, \/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161740-244x300.jpg 244w, \/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161740-49x60.jpg 49w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/figure><\/div>\n\n\n\n<p>Look carefully, you can see her shoulder.<\/p>\n\n\n\n<p>I don\u2019t have a particularly \u2018smart\u2019 smart phone but it does allow me to zoom in nicely with the camera and video recorder.&nbsp; And so, from two seats away, hidden in plain sight \u2013 I am shoulder surfing like a pro.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"301\" src=\"\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161757.jpg\" alt=\"\" class=\"wp-image-275\" srcset=\"\/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161757.jpg 256w, \/wp-content\/uploads\/2021\/11\/Screenshot-2021-11-18-161757-51x60.jpg 51w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Personal chat<\/li><li>Contacts<\/li><li>Personal Identifiable Information<\/li><li>Company confidential information<\/li><li>Email addresses<\/li><li>Email login and content<\/li><li>Customer contacts and information<\/li><\/ul>\n\n\n\n<p><em>(Naturally, for ethical reasons I have blurred the screen but trust me when I tell you that I could read it very clearly)<\/em><\/p>\n\n\n\n<p>All whilst listening to the Beachboys greatest hits.&nbsp; Surfing LNER.<\/p>\n\n\n\n<p>This is not the first time I have observed this type of activity and it probably won\u2019t be the last.&nbsp; Possibly the best\/worst case I have seen was when a chap I was sitting next to on a flight to France, opened up his laptop and started working on a spreadsheet shortly after take-off. That time it was PII, financial records, emails, phone numbers, business records and a whole host of other stuff which I am certain I wasn\u2019t supposed to be privy to.<\/p>\n\n\n\n<p>To quote the great Tom Jones \u2013 \u2018It\u2019s not unusual\u2019 to see this type of activity everywhere &#8211; as we are busy people.&nbsp; We need to do things when we are out and about \u2013 and I totally get it.&nbsp;<\/p>\n\n\n\n<p>But we also need to be aware and \u2018street smart\u2019.<\/p>\n\n\n\n<p>Even if it isn\u2019t Evil-Dude the hacker who is looking over your shoulder it might be someone who has a vested interest in what you are doing or saying.&nbsp; Or becomes interested based on what they can see.<\/p>\n\n\n\n<p>Personal data is personal, company confidential data is confidential, data protection is all about protecting data \u2013 it is all quite a simple concept really &#8211; and remember it is not just you that you are protecting.<\/p>\n\n\n\n<p>Think about your working practices.&nbsp; Think about the working practices of your staff and members of your team.&nbsp; Have a chat about data protection and what data can be accessed on mobile devices.&nbsp; Have a chat about how secure that data is whilst it is safely encrypted at rest and in transit when using the VPN.&nbsp;<\/p>\n\n\n\n<p>Have a chat about how insecure that data is whilst it&#8217;s being used for all to see.<\/p>\n\n\n\n<p>After the chat \u2013 draw up a specific security policy or amend your existing ones.&nbsp; Then turn the chat into a user training and awareness session so nobody misses out on the message.<\/p>\n\n\n\n<p>You could always boost your training sessions with some Beachboys music playing in the background (optional).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anybody remember the classic Beachboys song \u2018Surfing USA\u2019?&nbsp; Well how about \u2018Surfing LNER\u2019 as an alternative? I am getting dismayed in my classes as my references to all time great music hits are now being met with sideways glances and &hellip; <\/p>\n","protected":false},"author":1,"featured_media":273,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorised","grid-sizer"],"_links":{"self":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=272"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/272\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/posts\/272\/revisions\/284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=\/wp\/v2\/media\/273"}],"wp:attachment":[{"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberphil.co.uk\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}