by Steve Fox

Hackers want to hypnotize you

analysis
Oct 1, 20073 mins

Social engineering tricks of the pros, plus unintentional religion in the workplace

When I was a kid, I was fascinated by hypnosis. What could be more appealing to a nerdy 13-year-old boy living in Queens than getting others to do whatever he wanted?

So I read a how-to book, invited a few friends to my house, and put my newfound expertise into practice. At first, nothing worked, then — wonder of wonders — my buddy David Finkelstein appeared to go into a trance. Shortly afterward, upon my direction, he began licking his right arm in an attempt to lap up the imaginary ice cream that was dripping onto his sleeve from the equally imaginary Rocky Road cone he was clutching in his hand. My friends were flabbergasted; I instantly achieved minor celebrity status. A week later David admitted to me that he had been faking it the whole time. I returned the hypnosis book to my local library and gave up on the concept of controlling others’ behavior.

I may have abandoned my adolescent dream, but the concept of getting people to do what you want is alive and well. Today, this kind of behavioral manipulation is called “social engineering,” and it has become a favored hacker tool, used for attacking unwary human beings — the weakest link in any business’s security chain. To help you and your organization avoid the most common social engineering traps, we asked frequent InfoWorld contributor Andrew Brandt to get inside the mind of a typical social engineer and describe how he goes about his nefarious business. The result, “How to think like an online con artist,” provides a rare insider’s view of this murky world.

Much of Brandt’s information comes from professionals who are hired to perform security audits as a way of evaluating a company’s security infrastructure. Despite the stepwise nature of the article, Brandt is emphatic that he would never advocate employing the techniques he describes without getting someone’s permission first. “I wrote this story to illustrate the social engineering techniques that pros use,” he says. “I want to show you what to look out for, not offer a how-to guide on becoming a thief.”

Brandt understands the mentality of the hacker demimonde, as he amply demonstrated in his highly entertaining June 2007 article “Stupid hacker tricks.” Even so, it was tricky to find folks willing to go on record. “Many of the people who do this kind of security testing professionally wouldn’t talk to me,” Brandt explains. “Some of them have trade secrets and didn’t want to reveal them.” Others didn’t want to risk embarrassing their clients, who might recognize themselves in the story, even if they weren’t mentioned by name.

LinkedIn gets religion

I’m a member of the LinkedIn social network, and I routinely get invitations from colleagues (or sometimes even total strangers) to join their list of contacts. A recent invite, though, threw me for a loop. It came from a friend named Christina (in the screen shot here, I’ve obscured her last name and other details to protect her privacy). The buttons at the bottom of the screen offered the usual options to “accept” or “archive” the invitation, or to reject it because “I don’t know Christina.” In this case, though, because her first name is too long to fit on the button, by rejecting her offer, I would be asserting that “I don’t know Christ…” I’m not making this up. May this screen shot be my witness.