{"id":4363,"date":"2022-04-19T09:41:19","date_gmt":"2022-04-19T16:41:19","guid":{"rendered":"https:\/\/zed.inguardians.com\/?p=4363"},"modified":"2022-04-19T10:21:07","modified_gmt":"2022-04-19T17:21:07","slug":"ethics-and-social-engineering-exercises","status":"publish","type":"post","link":"https:\/\/zed.inguardians.com\/blog\/ethics-and-social-engineering-exercises\/","title":{"rendered":"Ethics and Social Engineering Exercises"},"content":{"rendered":"

Security professionals often find themselves tasked with performing different social engineering exercises. Whether overseeing these projects for our organization or executing them for another, many considerations go into every exercise. What is the goal? Who will be targeted? What are our tactics? However, the most critical question is how to perform these exercises ethically, causing the least harm while creating the most value for everyone involved.<\/p>\n

\u201cRealism\u201d in Phishing<\/h1>\n

We often see effective phishing attacks performed by real threat actors that make significant, empty promises: charitable donation requests, the promise of money or benefits, and even promotions. We also often see terrible threats, such as blackmail or the threat of employment termination.<\/p>\n

As security professionals, our goal is to help our organization or clients measure their security posture and provide actionable improvements. Social engineering is certainly a very real, very effective threat constantly leveled at organizations and individuals. Many experts consider social engineering to be an area that requires testing and education, and rightly so. Far too often, however, we strive for an absurd level of realism, overriding and, sometimes, even outright going against the end goal: Making the organization more secure.<\/p>\n

\u201cAttackers send these sorts of emails, so why can\u2019t we?\u201d<\/p>\n

When we conduct phishing exercises which make dangerous promises we cannot or will not make good on, we do more harm than good. We create a gap between the security team and the staff who will be targeted, fostering distrust or even outright hostility between users and security staff. Our goal is to improve the security posture, educate users, and identify and fill the gaps in defenses. Promising staff additional money, free COVID tests, or work-at-home opportunities may be realistic. It shows whether employees are susceptible to these threats and may identify training needs. However, it may also indicate that security does not care about the well-being of the targeted staff.<\/p>\n

We\u2019re far better off using tamer scenarios that illustrate the technical and procedural \u201ctells\u201d of a realistic phishing attack without using emotional tools that can cause unnecessary damage. For example, consider the following general pretexts.<\/p>\n