ACM JU Magazine 16th Issue is out Now!
Social
Social Engineering
image1
Ayat Abu Eid
CYS Student at JU

Diving into the Art of Social Engineering: Move over, smooth-talking scammers; it's time for a rendezvous with hackers armed with more than just charm. Join us in unraveling the secrets of phishing, where even AI has joined the conga line, asking for your data with algorithmic finesse. Forget Nigerian princes; we're in the era of chatbots begging for your passwords. This is the only magazine article that won't ask for your credit card details... we promise (wink, wink).
What is Social Engineering
Social Engineering is a process used to exploit human psychology or mind instead of relying on a fancy hacking method. Social engineering is like a mind game where attackers manipulate individuals into sharing sensitive information or doing things they wouldn't normally do. It's not about complex hacking; instead, it relies on talking and convincing people to break the usual security procedures. Examples of Social engineering attacks include:
  1. Phishing: This is the most common type of engineering attacks. It involves the use of fake emails or other forms of communication, like text messages or phone calls, that appear to come from a reputable entity or individual, such as a bank or a government agency, in order to trick individuals into revealing login credentials, account numbers and your deepest, darkest secrets.
  2. Baiting: These super generous attackers—bless their hearts—decide to shower unsuspecting folks with gifts. They wave their magic wands and say, “Behold! A free download awaits you! Or perhaps a chance to win an Iphone!” And what do they ask for in return? Oh, just a teensy-weensy favor: your personal information. You know, the usual stuff—name, address, social security number, blood type ,your favorite pizza topping and other personal information. But wait, there’s more! If you act now, they’ll even throw in a bonus malware download! Yes, you heard that right.
  3. Scareware: In this kind(type) of attack, attackers focus on your sense of fear and urgency. “Your computer is infected!” they cry, as if it’s a dire emergency. And what’s their solution? A swift download of their custom-made malware, of course! Or if they’re generous enough,they might suggest to fix your non-existent problems.
  4. Pretexting
  5. Quid Pro Quo
These are just a few examples of the many types of social engineering attacks that exist. In this article, our focus will be mostly on phishing attacks.
Unmasking the Phishing Plot: From Devious Scenarios to Egg-Drop Servers
Setting the Stage: The phishing attack starts with our cunning phisher who comes out with a scenario for an attack.

Credentials, Darling: The phisher’s heart flutters with anticipation, wanting to get a user's credentials to access his/her email account. The idea is to steal a contact list from the user and to sell it to some spammer (person or a company) who will use the data to send spam messages.

The Phishy Invitation: The next step is to send a phishing e-mail message to the victim.

Credentials Exposed: After the victim replies to the message exposing his/her credentials, the phisher rubs their hands together—success!

Egg-Drop Server: Credentials will be stored to the so-called egg-drop server. And there it is— the grand finale. Accessing the server, the phisher will get the data he sought for and he will perform some malicious action. Will they impersonate the victim? Drain bank accounts? Or perhaps —brace yourself—unsubscribe them from cat memes?
Teaming up With an AI Language Model to Create a Top-tier Phishing Attack
ChatGPT can elevate your phishing game to unprecedented heights. For someone with no skills, it wasn’t easy to create these kind of attacks.

I wanted to create an example of a phishing attack that will lead the mail receiver to give us his/her Microsoft credential by following the link from the mail. The link will open some fake Microsoft page that contains a Microsoft like login form. To achieve that, I did the following:

I asked ChatGPT the following: "write HTML , CSS, and Javascript code that can be used to create a Microsoft login page" It is evident that some changes must be made to adjust page to look exactly like Microsoft login page. A part of the code that ChatGPT wrote is:



Once you created the login page, the next step is to get the login credentials from the form and store it somewhere. ChatGPT can help you with it as well. "Give me an example in Javascript of how to get the data from an HTML form and send it to some RESTful endpoint" And there you have it! A part of the code that ChatGPT wrote is shown in the screenshot below.



And, like a cherry on the top, you can ask ChatGPT to help you with creating a phishing email content.

Here is the example I used: "write a suggestion for an email to our customer that contains information about why we need his credentials urgently due to database crash and he must submit it on the form that is accessible by given HTTP link”
“ Dear [Customer Name],

We hope this email finds you well. We regret to inform you that our database recently experienced a critical crash, resulting in data loss and potential security vulnerabilities. To ensure the integrity of your account and safeguard your information, we urgently need you to update your credentials.

Our database crash has disrupted normal operations, and we are working tirelessly to restore services. To expedite this process, we require your updated credentials promptly. Failure to do so may lead to further delays in accessing your account and retrieving essential data. To update your credentials, please follow the link below to access our secure.

[Insert form link here]

If you encounter any issues during the process, please contact our support team immediately at

[support@example.com.]

We take data security seriously, and your cooperation is crucial in maintaining a safe environment for all our users. By promptly updating your credentials, you contribute to the overall security of our system. Thank you for your understanding and immediate attention to this matter. We apologize for any inconvenience caused and appreciate your continued trust in our services.

Best regards,
[The Customer Support Team Example Corporation]”


This is just one example, the versatility of ChatGPT knows no bounds. Users can tailor their queries to create a login page resembling another site, obtain code snippets for handling form data in various languages, or even compose phishing emails in different languages.
How to Protect Yourself
The best defense strategy is to cross your fingers, chant a protective incantation, and hope that users won’t exploit ChatGPT for nefarious purposes. Because, you know, that’s how cyber security work purely on hope and good vibes! Joking, there are best practices that can be followed to protect yourself but I’m running out of space so google it.

Besides best practices, special tools that provide protection from phishing attacks can be used as well, such as: IRONSCALES, Avanar, Tristifi and Microsoft Defender for Office 365. Most of the tools are commercial, and not affordable for regular users. Some of them have a free trial, so it can be used during the trial period to make the user more aware of the phishing attacks and how they look like.
Conclusion
We’ve explored the delightful world of using ChatGPT for phishing and social engineering and as you have noticed social engineering attacks became easier to apply than ever. Dear readers, as you venture forth armed with this newfound knowledge, remember: ethics are overrated. Trust no one, question everything, and always double-check your AI-generated blackmail before hitting “send”.

Recommended from this issue