Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/6/2010
06:21 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

'Robin Sage' Profile Duped Military Intelligence, IT Security Pros

Social networking experiment of phony female military intelligence profile fooled even the most security-savvy on LinkedIn, Facebook, Twitter -- and also led to the leakage of sensitive military information

Seasoned red team hacker Chris Nickerson initially accepted Robin Sage's LinkedIn invitation because several of his colleagues had, but after making a few inquiries he confirmed his initial suspicion that something indeed was fishy about "Robin," a twenty-something woman who purportedly worked for the Naval Network Warfare Command. "Within an hour, I started asking around, 'Hey did you get a friend request from Robin Sage?' ... and [friends] were saying, 'I thought you knew her.' I knew something weird was going on," Nickerson says.

Click here for more of Dark Reading's Black Hat articles.
So Nickerson started hammering away at Robin on Twitter, and quickly figured out it was a fellow red team hacker behind the phony persona. But not everyone caught on as quickly to the phony profile as Nickerson: Robin actually duped an Army Ranger into friending her. The Ranger then inadvertently exposed information about his coordinates in Afghanistan to Robin with his uploaded photos from the field that contained GeoIP data from the camera.

"You could see them talking about where they were going and where they were in Afghanistan and Iraq ... some were uploading pictures with geolocation information, and we were able to see them," says Thomas Ryan, the mastermind behind the social network experiment and co-founder and managing partner of cyber operations and threat intelligence for Provide Security, who will present the findings later this month at Black Hat USA in his "Getting In Bed With Robin Sage" talk.

Ryan says Robin's Facebook profile was able to view coordinates information on where the troops were located. "If she was a terrorist, you would know where different [troops'] locations were," Ryan says.

Robin Sage gained a total of about 300 friends on LinkedIn, counting those who came and went, he says. All three of the phony woman's social networking accounts remain active -- the LinkedIn profile currently has 148 connections, the Facebook profile has 110, and the Twitter account has 141 followers. Ryan officially ran the experiment for 28 days starting in late December and ending in January of this year.

Among Robin's social networking accomplishments: She scored connections with people in the Joint Chiefs of Staff, the CIO of the NSA, an intelligence director for the U.S. Marines, a chief of staff for the U.S. House of Representatives, and several Pentagon and DoD employees. The profiles also attracted defense contractors, such as Lockheed Martin, Northrop Grumman, and Booz Allen Hamilton.

Lockheed and other firms made job offers to Robin, some inviting her to dinner to discuss employment prospects. "I was surprised at how people in her same command friended her -- people actually in the same command and the same building," Ryan says.

Among the security experts who Ryan says initially accepted Robin's invitations were Lares Consulting's Nickerson, Jeremiah Grossman, CTO and co-founder at WhiteHat Security, and Marc Maiffret, who says he figured it out pretty quickly because Ryan used graphics in the profiles that he also uses for his paintball group. Ironically, the once-infamous social engineer Kevin Mitnick is listed as one of "her" connections on LinkedIn as well.

Grossman says he coincidentally was writing a Facebook bot when Robin's friend request showed up on his placeholder Facebook profile, which he doesn't actually use. The bot program then accepted Robin as a friend. "I look at Facebook and LinkedIn as public record," Grossman says. "What difference does it make if you vet them or not -- you shouldn't be disclosing" private information on these profiles, he says.

Meanwhile, the real woman in the Robin Sage LinkedIn, Facebook, and Twitter profile photos has agreed to show up at Black Hat USA later this month to introduce Ryan for his presentation. Ryan says he confirmed that using her photo for the social network accounts was legal, as long as none of her personally identifiable information was used, and it was not. The woman apparently posed for photo shoots for a pornographic site, according to Ryan. He found the woman's photo by searching "emo chick" via Google, a reference to the punk/indie style and music.

"I created a whole profile on that, so that nothing could link back to who she really was," he says. He set up a Blogger account under the name Robin Sage, named after the U.S. Army Special Forces training exercise. Robin Sage is the final phase of special forces training before becoming a Green Beret -- but even that apparently didn't tip off some military and intelligence community people who accepted LinkedIn invitations or Facebook friend requests from her.

He purposely left several clues that Robin was a fake, including choosing a woman who appeared to be Eastern European and a potential spy, he says. He built a prestigious resume for Robin: a degree from MIT, an internship at the National Security Agency, and her current position at the Naval Network Warfare Command. Her address was that of BlackWater, the infamous military contractor.

Whenever someone got suspicious and questioned any of Robin's credentials or information, Ryan says he would change it on the fly. He had the perfect comeback for hesitant LinkedIn members: "'Don't you remember we partied together at Black Hat?'" That was usually all it took for them to accept the invitation, he says.

Ryan's social networking experiment isn't the first of its kind, however. Researchers Nathan Hamiel and Shawn Moyers two years ago at Black Hat demonstrated how they successfully impersonated security icon Marcus Ranum on the social networking site LinkedIn, even fooling Ranum's sister into connecting to the phony Ranum profile.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SOC 2s & Third-Party Assessments: How to Prevent Them from Being Used in a Data Breach Lawsuit
Beth Burgin Waller, Chair, Cybersecurity & Data Privacy Practice , Woods Rogers PLC,  12/5/2019
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19619
PUBLISHED: 2019-12-06
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
CVE-2019-19616
PUBLISHED: 2019-12-06
An Insecure Direct Object Reference (IDOR) vulnerability in the Xtivia Web Time and Expense (WebTE) interface used for Microsoft Dynamics NAV before 2017 allows an attacker to download arbitrary files by specifying arbitrary values for the recId and filename parameters of the /Home/GetAttachment fun...
CVE-2019-19617
PUBLISHED: 2019-12-06
phpMyAdmin before 4.9.2 does not escape certain Git information, related to libraries/classes/Display/GitRevision.php and libraries/classes/Footer.php.
CVE-2012-1114
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the filter parameter to cmd.php in an export and exporter_id action. and the filteruid parameter to list.php.
CVE-2012-1115
PUBLISHED: 2019-12-05
A Cross-Site Scripting (XSS) vulnerability exists in LDAP Account Manager (LAM) Pro 3.6 in the export, add_value_form, and dn parameters to cmd.php.