How Clicking a Single Link Can Cost Millions | Ryan Pullen | TED

TED
29 Feb 202414:21

Summary

TLDRThe speaker shares three perspectives on cybersecurity: investigating a costly ransomware attack, unethically breaching a secure building through social engineering, and nearly falling victim to a sophisticated phone scam. The underlying theme is how human behavior is exploited in cyberattacks, despite common perceptions of cybersecurity as solely technological. Small bits of personal data can be leveraged to create convincing narratives, manipulating individuals through empathy and trust. The speaker emphasizes protecting personal information and raising awareness of human vulnerabilities in the realm of cybersecurity.

Takeaways

  • 🔐 Cybersecurity is not just about technology; 95% of cyberattacks involve a human element, exploiting human behavior and vulnerabilities.
  • 💰 Cybercrime can have severe financial and human impacts, with incidents costing millions and causing significant stress and disruption.
  • 🕵️ Social engineering techniques, such as deception and manipulation, can bypass even robust security controls by exploiting human trust and empathy.
  • 🔑 Small pieces of personal information can be used to build credible narratives and gain access to sensitive accounts or systems.
  • 🌐 Personal data shared online, even seemingly innocuous information, can be valuable for cybercriminals and used for targeted attacks.
  • 🔒 Using unique, strong passwords for different accounts can mitigate the risk of widespread account compromise.
  • 🚨 Staying vigilant, questioning suspicious requests, and verifying identities can help prevent falling victim to scams and cyberattacks.
  • 👪 Both younger and older generations are vulnerable to cybercrimes, making awareness and education crucial for all age groups.
  • 🧠 Understanding how human behavior is exploited in cyberattacks can empower individuals to protect themselves and their loved ones.
  • 🛡️ Sharing information responsibly and considering the potential risks can significantly reduce the chances of falling victim to cybercrime.

Q & A

  • What type of cyber attack did the organization suffer from?

    -The organization suffered from a ransomware attack, which is designed to steal data and make it unusable by replicating itself throughout the business systems.

  • How did the ransomware attack start?

    -A single individual clicked a link, unknowingly enabling the ransomware attack to infect the organization's systems.

  • What was the human impact of the ransomware attack?

    -Multiple employees were signed off sick due to stress, and others were unable to work the next day due to the impact of the attack.

  • What percentage of cyberattacks involve a human element, according to the IBM study mentioned?

    -According to the IBM study in 2021, 95% of cyberattacks used a human element.

  • How did the speaker gain unauthorized access to a well-known building in London?

    -The speaker employed social engineering techniques, such as creating a believable story and eliciting empathy from the security personnel, to gain access to the building without proper authorization.

  • What happened when the speaker received a suspicious phone call claiming to be from their bank's fraud line?

    -The caller had access to personal information like the speaker's mother's maiden name and address, building credibility. However, the speaker remained skeptical and ultimately hung up when the caller asked for a code from their mobile app.

  • How much does it cost to purchase 1,000 email addresses and passwords on the criminal underground, as mentioned in the script?

    -According to the script, 1,000 email addresses and passwords can be purchased for around 6 US dollars on the criminal underground.

  • What advice does the speaker give regarding password management?

    -The speaker advises resetting passwords regularly and not using the same password across multiple accounts to minimize the risk of unauthorized access.

  • How can sharing information on social media potentially lead to exploitation, as described in the script?

    -Sharing details like vacation plans or financial information on social media can provide criminals with valuable information to craft convincing social engineering attacks, such as calling and impersonating banks or organizations.

  • What is the speaker's main message regarding cybersecurity and human behavior?

    -The speaker's main message is that cybersecurity is not just a technological issue but also heavily involves human behavior and social engineering tactics. The speaker emphasizes the need to understand and protect against these human elements of cybercrime.

Outlines

00:00

🔒 The Human Element in Cybersecurity

The narrator begins by recounting a call for help from an organization hit by a ransomware attack, emphasizing the severe financial and human costs involved, including stress-induced illnesses among employees. Drawing from this experience and the insight that 95% of cyberattacks involve a human element, the narrator challenges the common perception of cybersecurity as solely a technological issue. Highlighting personal involvement in both investigating such incidents and ethically testing security measures, the narrative showcases the vulnerabilities in human nature that cyberattacks exploit, such as empathy and trust, illustrated by a successful social engineering attempt to gain unauthorized access to a secure building in London.

05:01

🛡️ Personal Encounters with Cyber Vulnerabilities

The second paragraph shifts focus to the narrator's personal experiences with cybersecurity from three perspectives: as a helper in recovery efforts, an ethical aggressor testing security measures, and a victim of attempted fraud. These stories highlight the complex interplay between human behavior and cybersecurity, illustrating how easily individuals can be manipulated through social engineering tactics. The narrator reflects on the broader implications of these vulnerabilities, pointing out how easily available personal data can fuel scams and the importance of maintaining cautious optimism and skepticism to protect oneself from cyber threats.

10:04

🌐 Safeguarding Against Cyber Exploitation

In the concluding section, the narrator emphasizes the importance of recognizing and guarding against the exploitation of human behavior in cybersecurity. By sharing basic preventive measures like password management and being cautious about sharing personal information, the narrative calls attention to the widespread risk of cybercrime across all generations. Using examples of how easily people can be deceived into sharing sensitive information, the narrator stresses the critical need for public awareness about the human elements in cybersecurity and urges the audience to protect their digital identities and those of their loved ones.

Mindmap

Keywords

💡Ransomware

Ransomware is a type of malicious software designed to block access to a computer system or data until a ransom is paid. In the video, the speaker mentions that the organization they were assisting had suffered a ransomware attack, where the attackers stole data and made it unusable. The ransomware replicated itself throughout the business, forcing them to resort to paper-based controls, and the incident cost around five million pounds to recover.

💡Social Engineering

Social engineering refers to the psychological manipulation of people into performing actions or divulging confidential information. The speaker describes using social engineering tactics to evade security controls and gain access to a well-known building in London. By creating a convincing story and eliciting empathy from the security personnel, they were able to bypass multiple security checkpoints without proper authorization.

💡Human Element

The human element refers to the role that human behavior and vulnerabilities play in cybersecurity incidents. The speaker emphasizes that 95 percent of cyberattacks involve a human element, according to an IBM study. This means that cybersecurity is not just about technological defenses but also about addressing the ways in which people can be exploited through tactics like social engineering and psychological manipulation.

💡Data Breach

A data breach is an incident where sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized individual. The speaker mentions that the ransomware attack they investigated involved the theft of data, which is a form of data breach. Data breaches can have severe consequences for individuals and organizations, including financial losses, reputational damage, and legal liabilities.

💡Cybercrime

Cybercrime refers to criminal activities carried out by means of computers or the internet. The video explores different perspectives of cybercrime, including the speaker's role in investigating a ransomware attack (a form of cybercrime), their ethical hacking exercise to evade security controls (which could be considered a simulated cyberattack), and their experience as a victim of a phone-based scam (another form of cybercrime).

💡Vulnerability

A vulnerability is a weakness or flaw in a system, network, or application that can be exploited by attackers to gain unauthorized access or cause harm. The speaker mentions that vulnerabilities from a technical standpoint can lead to data being exposed, which can then be used to exploit human behaviors through tactics like social engineering and phishing attacks.

💡Phishing

Phishing is a form of social engineering attack where attackers attempt to trick users into revealing sensitive information or performing actions that compromise their security. The speaker describes their personal experience of being a victim of a phishing attack, where scammers impersonated their bank's fraud line and tried to obtain their card details and PIN number by building a perception of credibility and urgency.

💡Identity Theft

Identity theft is the fraudulent acquisition and use of someone's personal or financial information for criminal purposes. The speaker warns that even small pieces of information, such as email addresses and passwords available on the criminal underground, can be used to build a narrative and potentially lead to identity theft or unauthorized access to accounts.

💡Empathy

Empathy is the ability to understand and share the feelings of another person. The speaker highlights how social engineering attacks often rely on exploiting empathy, as they did when gaining unauthorized access to the building in London. By creating a convincing story and making the security personnel feel sorry for them, they were able to elicit an empathetic response and gain entry.

💡Cybersecurity Awareness

Cybersecurity awareness refers to the knowledge and understanding of cybersecurity risks, best practices, and protective measures. The speaker emphasizes the importance of raising awareness about the human elements of cybersecurity, such as social engineering tactics and the value of personal information. By increasing awareness, individuals can better protect themselves and their loved ones from potential cyberattacks and scams.

Highlights

A single individual clicked a link, and a single individual enabled this, unknowingly, to happen to an organization.

Multiple people were signed off sick due to stress, and multiple people were unable to go to work the next day, and carry out their job.

IBM did a study in 2021, and 95 percent of cyberattacks used a human element.

It means people can be exploited, too. There's no lines of code, and there's no fancy software.

I was commissioned to evade security controls, for a very well-known building in London. That's a snazzy way of saying 'break in'.

I tried to go down the social engineering route, which is the art of kind of deception, and making people believe something without the full information.

I made up a story and I said I was here for a legal matter, and I was only able to achieve what I needed to achieve, on these premises.

That emotion that you would have felt, where you wanted to help me, or you wanted me to continue, is exactly how this person felt.

I was paid as a cybersecurity expert to evade the controls of this building. And all I did was ask for access and make someone feel sorry for me.

I received a phone call from a phone number. And they said, 'Hello, is this Mr. Pullen?' And they explained there's been three different transactions, and would I like them to block them for me?

They were confirming my identity. They told me where I lived, my mother's maiden name, and they told me a few other bits of information the bank would know.

All of this is to build a perception of credibility. Why shouldn't I trust you? And why shouldn't you be phoning me to help me?

Data has a value in different pockets, and with small bits of information you can build quite a narrative, as you can see.

You would be able to do, on the kind of criminal underground, if you like, would be buy 1,000 email addresses and passwords, for around six US dollars, a cup of coffee in some places, right?

I don't believe any generation can avoid this anymore. Children are being raised with iPads, and older generations are online shopping, because of convenience and accessibility to services they may not have had before.

Transcripts

play00:04

I received a phone call from somebody who needed my help.

play00:06

And they explained to me

play00:08

that this organization had suffered a cyberattack,

play00:11

more specifically a ransomware attack,

play00:14

which is designed

play00:16

to both steal your data and make it unusable.

play00:21

It replicates itself throughout the business

play00:24

and can drive you down to paper-based controls.

play00:27

And this was an opportunity that I saw

play00:29

where I could influence something positively.

play00:33

And it was my job to investigate what had happened,

play00:36

how it happened and why.

play00:41

And I saw something that I hadn't experienced before firsthand.

play00:45

In 2017, the NHS suffered something similar,

play00:49

and it cost nearly 100 million pounds to recover.

play00:54

This incident cost around five million pounds to recover

play00:56

and took 14 months.

play00:59

Yet what I saw was the human impact.

play01:03

How this happened?

play01:04

A single individual clicked a link,

play01:06

and a single individual enabled this, unknowingly,

play01:10

to happen to an organization.

play01:12

Multiple people were signed off sick due to stress,

play01:15

and multiple people were unable to go to work the next day

play01:19

and carry out their job.

play01:22

Now, for me,

play01:23

cybersecurity is a very technological-focused term.

play01:28

And yet IBM did a study in 2021.

play01:32

and 95 percent of cyberattacks

play01:36

used a human element.

play01:39

Now that's all well and good,

play01:42

but what does that actually mean?

play01:44

It means people can be exploited, too.

play01:47

There’s no lines of code, and there’s no fancy software.

play01:51

Cybersecurity is, as far as the media is concerned,

play01:55

maybe teenagers in their bedrooms causing trouble,

play01:59

stealing things and learning how to use them.

play02:02

Yet what people don't see is the impact and how his day-to-day life.

play02:08

And this incident for me,

play02:10

made me think slightly differently around cybersecurity.

play02:14

And recently I had an opportunity

play02:17

which presented this thought process.

play02:21

I was commissioned to evade security controls

play02:26

for a very well-known building in London.

play02:29

That’s a snazzy way of saying “break in.”

play02:32

And effectively, it was my job to see if I could get past the security controls

play02:37

and get into the building.

play02:39

And so for me, thinking kind of outside of the box,

play02:44

this building has floor to ceiling doors,

play02:46

24/7 security team,

play02:47

endless budget for this kind of thing based on where they are.

play02:51

And so, thinking slightly outside,

play02:55

I needed to come up with a different plan.

play02:58

And ...

play03:00

What I did was I tried to go down the social engineering route,

play03:03

which is the art of kind of deception

play03:07

and making people believe something without the full information.

play03:12

And what I did was I walked in the front door,

play03:16

dressed quite similarly to this,

play03:18

and I was greeted by eight people

play03:20

and I thought, oh, that's a bit over the top.

play03:23

And it's because every single person should have the right information

play03:30

and should know where they're going,

play03:31

It’s very rare for them to be visitors.

play03:33

And this person asked me,

play03:36

"Why are you here? Who are you here to see?"

play03:38

And I explained, I didn't have an appointment,

play03:40

but I was here to see a specific person.

play03:42

And they said, "Yeah, there's no chance you're getting in."

play03:45

And I thought, oh goodness, I traveled all this way.

play03:48

And yet what I know is people are empathetic,

play03:51

and people want to help each other, right?

play03:53

And so I made up a story and I said I was here for a legal matter,

play03:57

and I was only able to achieve what I needed to achieve

play04:00

on these premises.

play04:02

And they said, "Yeah, sorry, we're still ..."

play04:04

And I explained the urgency, and I made them feel sorry for me.

play04:09

And what I was thinking about giving this talk,

play04:12

I was going to pause and I was going to pretend that I was struggling.

play04:16

And that emotion that you would have felt

play04:17

where you wanted to help me

play04:19

or you wanted me to continue, is exactly how this person felt.

play04:23

They felt they were stopping me from doing my job, which they were,

play04:28

but not for how they expected it.

play04:31

And then I pretended to be on the phone in the foyer, pacing up and down,

play04:35

pretending to be aggravated.

play04:38

And then the manager came across with a QR code for me and said,

play04:41

"So sorry for the issues, no problem."

play04:43

And they showed me around a side passage away from the two rounds of security.

play04:49

So I had my laptop bag with me with “the evidence,”

play04:54

and it wasn’t checked and I was able to go in,

play04:56

and I was able to go to the floor that I needed to.

play05:00

And I was paid as a cybersecurity expert to evade the controls of this building.

play05:05

And all I did was ask for access and make someone feel sorry for me.

play05:09

And so that's two very different perspectives.

play05:14

One, the five-million-pound job and took 14 months to recover

play05:17

where I was helping people,

play05:18

but the second, I was the aggressor

play05:20

or the person trying to get in.

play05:22

Now this is all enabled through the way that humans exist

play05:26

and human behavior.

play05:28

And cybersecurity as a whole doesn't really represent that

play05:31

in a way that is sufficient, I don't think.

play05:35

And so I have one more narrative and different perspective to share.

play05:40

And it's when I was a victim.

play05:43

This happened only a few weeks ago.

play05:46

And what happened was I received a phone call.

play05:50

It was around 8pm.

play05:51

I received a phone call from a phone number.

play05:55

And they said, "Hello, is this Mr. Pullen?"

play05:58

And I said yes.

play06:00

And they said, "We've seen your bank cards be used

play06:03

in a different part of the country."

play06:05

And I thought, oh goodness.

play06:07

And what they explained was,

play06:09

they explained there's been three different transactions

play06:12

and would I like them to block them for me?

play06:14

I said, "Yes please.

play06:15

That would be really helpful."

play06:17

And I Googled the number out of instinct,

play06:19

and it was the phone number from the fraud line in the bank.

play06:25

And something didn't add up.

play06:27

And I'm a bit of a pessimist.

play06:30

I don't really trust people.

play06:32

And so I was instantly on the back foot,

play06:35

and they're saying all of these things,

play06:37

they were confirming my identity.

play06:38

They told me where I lived, my mother's maiden name,

play06:41

and they told me a few other bits of information the bank would know.

play06:44

And all of this is to build a perception of credibility.

play06:48

Why shouldn't I trust you?

play06:50

And why shouldn't you be phoning me to help me?

play06:54

And we go back and forth for around an hour and a half,

play06:58

and there was a few things that didn't sit right with me.

play07:01

And so when I was on hold, when they were blocking my transactions,

play07:06

I phoned the actual fraud line and I said,

play07:08

is there a way that I can verify their identity?

play07:11

The person on the phone said, "They sound very professional and legitimate"

play07:15

and they were.

play07:16

I asked for their name, and they had a fake LinkedIn profile.

play07:19

They had a fake crime reference number for me.

play07:22

And ...

play07:24

Me experiencing this firsthand,

play07:27

having investigated things like this on a regular basis for mortgages

play07:30

and transactions ending up in the wrong place,

play07:33

I knew something wasn’t sitting quite right,

play07:36

and the true person put a note on my account

play07:40

and I explained to the person,

play07:42

"Can you tell me what the note says, please?"

play07:44

And that was the first time they got a little bit flustered.

play07:48

And it took them five minutes and they said,

play07:50

"We'll go and check with accounts team.

play07:52

But in the meantime, can you tell me the code that it says in your mobile app?"

play07:56

At which point I hung up, got my cards replaced, and I was OK.

play07:59

But these three narratives

play08:02

of cybercrime or scams or criminal behavior

play08:07

are all technology-focused with the end goal

play08:10

but are human-led.

play08:12

And you may ask, "How is this possible?"

play08:15

"Why can this be so easy?"

play08:18

I've literally just walked into a building

play08:21

and asked someone to let me in with a fake story.

play08:24

And someone's phoned me up with a small piece of information

play08:27

and built this incredible picture around, OK, yes, I should trust you.

play08:31

And it's because data has a value in different pockets,

play08:37

and with small bits of information you can build quite a narrative,

play08:43

as you can see.

play08:45

And so today,

play08:47

what you would be able to do

play08:49

on the kind of criminal underground, if you like,

play08:52

would be buy 1,000 email addresses and passwords

play08:55

for around six US dollars

play08:57

a cup of coffee in some places, right?

play08:59

That's 1,000 people's account details that you may be able to log into

play09:03

or have tangible information to create a case,

play09:07

and that might be pretending to be Amazon for a password reset.

play09:10

It might be what location you went on holiday,

play09:13

and we're going to do a bit more of a targeted attack that way.

play09:17

And this information is available

play09:21

because of vulnerabilities from a technical standpoint.

play09:24

Yet this is to exploit human behaviors.

play09:27

Take my parents, for example.

play09:29

I think I’m in cybersecurity because my parents give me a balance.

play09:32

My mom is 100 percent, 110 percent optimist.

play09:35

Nothing's going to go wrong, everything's OK,

play09:37

no one's going to hurt my little boy and all of this sort of stuff.

play09:41

And my dad's much more on the pessimistic end where,

play09:44

“Why do you want to know me?

play09:45

Why do you want this information?”

play09:48

And so that balance for me brings kind of both sides of the story.

play09:54

And my mom is the sort of person that would have shared

play09:57

the traditional WhatsApp messages,

play10:00

250 pounds at Christmas and oh, how lovely that would be,

play10:03

pay for your Christmas lunch and all those sorts of things.

play10:07

And that then becomes a whole different attack vector,

play10:10

because it's coming from someone you trust,

play10:12

and they're sharing you a link

play10:14

and they're sharing something you might want to click,

play10:16

and you begin to trust it even more.

play10:18

And so my talk is around really focusing on the ways

play10:22

in which human behavior is exploited

play10:25

and how we can benefit and protect each other.

play10:28

And it's OK to call these things out.

play10:30

And so there's some basic things you can do,

play10:32

such as resetting passwords

play10:34

and making sure you're not using the same password for all your accounts.

play10:37

Because if one of your passwords did get leaked,

play10:39

you would like to know, OK, it's just this one account,

play10:42

and I understand that's the one I need to look after.

play10:45

When many people will use the same profile for Facebook,

play10:48

their bank -- their online banking, sorry,

play10:51

and sites that you can purchase things.

play10:54

So you might be able to go on Amazon

play10:56

and buy an iPhone with someone's username and password, right?

play10:59

Bank account details are stored.

play11:01

And that creates a whole different perspective of risk and cybercrime.

play11:07

And so for me,

play11:09

I don't believe any generation can avoid this anymore.

play11:14

Children are being raised with iPads,

play11:16

and older generations are online shopping

play11:18

because of convenience and accessibility to services they may not have had before.

play11:23

And so I believe that understanding how these things may happen

play11:28

and putting some light on them

play11:31

can really impact the way in which people conduct themselves

play11:36

and challenge when things may not feel quite right.

play11:40

And so for me,

play11:42

going through this journey and those three different perspectives,

play11:45

the one where I was the person helping, five million pounds,

play11:48

and seeing people really suffer.

play11:50

The second one where I was putting people potentially in that position,

play11:54

however fully ethically, and I was meant to be there for my job.

play11:58

And the third where I was the victim,

play12:00

it shows that it can take many different shapes based on information.

play12:05

And information can come from social media.

play12:09

And so if you're going on holiday to Mexico,

play12:11

say, for your honeymoon,

play12:13

you've saved up all of this money.

play12:15

Wonderful, have a lovely time.

play12:17

Yet someone you know or an acquaintance

play12:21

or you have public visibility of your arrangements.

play12:27

If someone knows that information

play12:29

and they know the bank you may work with,

play12:31

they could phone you whilst you land and say,

play12:35

"We've seen your card be used in this location."

play12:39

Now, how are you going to feel

play12:41

if someone's saying your card is being used and it's you?

play12:44

You're going to feel OK, cool, yeah, this is me, no problem.

play12:48

And they say, "OK, can you just confirm your identity?

play12:51

Because we want to make sure this is you.

play12:54

Can you just tell me your card number?"

play12:56

So you do, and then you're asked why you're there.

play12:59

"I'm on my honeymoon."

play13:00

"Have a lovely time."

play13:01

All of these social engineering, empathetic side of behaviors.

play13:06

And then you get down into the more conversational elements.

play13:10

"OK, can you just confirm your card isn't going to expire?

play13:13

When does it expire, please?"

play13:14

There's many different ways you can pose questions to make people feel acceptance.

play13:19

And then lastly, "Can you just check the security pin

play13:21

so I know which card I'm going to disable?"

play13:24

And by that time what you've done is

play13:27

you've told someone you've got money in your bank

play13:29

because you've been saving for this wonderful occasion,

play13:32

and also you're not going to be in the country to do anything about it.

play13:35

And so from a cybersecurity perspective,

play13:38

exploitation can happen in many different ways,

play13:41

and I don't think it's publicized around the human elements enough.

play13:45

And so if you take one thing from today,

play13:48

I ask that you see this as your opportunity

play13:53

to make sure that you protect your own information and your loved ones

play13:56

and your identity online.

play13:58

There's no problem with using social media.

play14:00

All I ask is you consider who you're sharing that information with.

play14:04

The reason being that information is valuable, even if it's not to you.

play14:08

It could build a picture,

play14:11

and it could cause you some trouble.

play14:14

Consider who you share your information with.

play14:16

Thank you.

play14:17

(Applause)

Rate This

5.0 / 5 (0 votes)

Related Tags
CybersecuritySocial EngineeringHuman BehaviorData BreachIdentity TheftScamsEmotional ManipulationPersonal ExperiencesAwarenessPrevention