Microsoft Blue Hat: Researcher Demos No-Hack Attack

Wealth of available online data on individuals, businesses can be used in targeted attacks

A researcher at Microsoft's closed-door Blue Hat summit last week demonstrated how seemingly mundane information available online about an individual or a business can be used against them in a targeted attack.

Roelof Temmingh, founder of Paterva, demonstrated how hackers don't eed traditional hacking tools given all of the information that' freely available about people and organizations on the Internet. With a little reconnaissance and the use of a handy information-collection, correlation, and visualization tool he built called Maltego, Temmingh showed how an attacker wouldn't have to bother with a port scan or other hacking tools to hack a person or a business.

Maltego is not a hacker tool -- it's for gathering, organizing and visualizing information from the Internet. It basically collects that accessible information online about an individual -- his email address, blogs, Facebook friends, hobbies, geographic location, job description -- and presents it in a usable, comprehensive profile of a potential target. "When I started developing this tool... I had the idea that all pieces of information out there were connected in some way or another," Temmingh says. "This tool proves that [they are]."

The problem, of course, is that users want instant access to information, and to be accessible via social networking sites and other online resources. And there's always a way for someone to abuse that interconnected information.

Attackers hack either to get control over a system, or to grab data. "You don't [necessarily] need to break into anything to get the information you need; it may be just a click," he says. "With some applications, the data you can get from them is the vulnerability."

Even PGP-encrypted email messages between two organizations can leak some useful clues. Piecing together the email addresses in the domain and the signed keys by specific email addresses can provide useful information, he says. "If five people at one organization sent mail to five others at a second organization and all mail was PGP-encrypted, this is telling us" something about the relationship between these two organizations, he says.

"If you think about an attack, the exploit itself is maybe 5 percent of the whole equation," Temmingh says. "It doesn't have to end in 'now you can ‘own’ someone.'"

Temmingh also demonstrated at Blue Hat how easy it is for an attacker to manipulate the inherent trust on the Internet -- and the lack of real identity verification. "If you're not on Facebook, I can [pose as you] on Facebook and put up content," he says. "I can invent anyone I want using your name and information gathered, he says.

Bottom line: There's no real enforcement for privacy on the Internet today, he says. "If you want to keep something private, keep it off the Internet. Even if you encrypt it... you could be leaking more information," like with the PGP-encrypted email example, he says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

About the Author(s)

Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights