{"id":7514,"date":"2022-10-21T11:51:08","date_gmt":"2022-10-21T15:51:08","guid":{"rendered":"https:\/\/joindeleteme.com\/blog\/?p=7514"},"modified":"2025-02-24T17:08:59","modified_gmt":"2025-02-24T22:08:59","slug":"cybercriminals-osint-social-engineering","status":"publish","type":"b2b-post","link":"https:\/\/joindeleteme.com\/business\/blog\/cybercriminals-osint-social-engineering\/","title":{"rendered":"OSINT: How Cybercriminals Exploit Open Source Data for Scams"},"content":{"rendered":"\n<p>Reconnaissance is how most cyber attacks start. Open-source intelligence (OSINT) is a powerful, free, and common way for cybercriminals to conduct reconnaissance.<\/p>\n\n\n\n<p>In an <a href=\"https:\/\/ke-la.com\/lockbit-2-0-interview-with-russian-osint\/\" target=\"_blank\" rel=\"noreferrer noopener\">interview<\/a> with the YouTube channel Russian OSINT, a ransomware group LockBit 2.0 member alluded to using OSINT tools and techniques throughout their attacks. We also know that the now-defunct Conti group <a href=\"https:\/\/krebsonsecurity.com\/2022\/03\/conti-ransomware-group-diaries-part-iii-weaponry\/\" target=\"_blank\" rel=\"noreferrer noopener\">invested heavily in OSINT<\/a> for intelligence gathering.\u00a0<\/p>\n\n\n\n<p>Although OSINT is a fundamental tool in all forms of cyber attacks, it is particularly important in social engineering. Speaking to <a href=\"https:\/\/www.darkreading.com\/remote-workforce\/email-defenses-under-siege-phishing-attacks-dramatically-improve\" target=\"_blank\" rel=\"noreferrer noopener\">DarkReading<\/a>, TrendMicro\u2019s vice president of threat intelligence, Jon Clay, said:<\/p>\n\n\n\n<p><em>\u201cThe actors investigate their victims using open source intelligence to obtain lots of information about their victim [and] craft very realistic phishing emails to get them to click a URL, open an attachment, or simply do what the email tells them to do, like in the case of business e-mail compromise (BEC) attacks.\u201d<\/em><\/p>\n\n\n\n<p>Many security teams already use OSINT tools to do penetration testing against their own systems to identify potential gaps and vulnerabilities a real-world hacker might be able to exploit. This helps them reduce their attack surface.<\/p>\n\n\n\n<p>However, few cybersecurity professionals audit employees&#8217; personal data available on the open web to measure or mitigate social engineering risk. According to Verizon\u2019s 2022 Data Breach Investigations Report, <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/3-big-takeaways-from-the-verizon-dbir-2022\" target=\"_blank\" rel=\"noreferrer noopener\">82% of breaches<\/a> recorded in 2021 involved some form of social engineering, with phishing via email accounting for more than 60% of breaches.\u00a0<\/p>\n\n\n\n<p>Numerous guides exist on using OSINT tools to gather intelligence and create convincing social engineering campaigns. Most specifically mention free data brokers and people search sites.&nbsp;<\/p>\n\n\n\n<p>By reducing the amount of publicly available information about employees on people search sites, security teams can cut off important OSINT pathways and reduce their organization\u2019s visibility to cybercriminals.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is OSINT?<\/h2>\n\n\n\n<p>Open-source intelligence, or OSINT for short, is the act of passively gathering intelligence from publicly available sources and tools.&nbsp;<\/p>\n\n\n\n<p>These might include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social media platforms and professional networks, i.e., LinkedIn, Facebook, Instagram, etc.<\/li>\n\n\n\n<li>Newspapers, magazine articles, and media reports.<\/li>\n\n\n\n<li>Conferences, webinars, and public speeches.<\/li>\n\n\n\n<li>Public trading data.<\/li>\n\n\n\n<li>Data brokers like Spokeo and PeekYou.\u00a0<\/li>\n\n\n\n<li>Web search engines like Google, Bing, etc. Techniques like Google Dorking can be used to narrow down results and also find information that would be difficult to find through standard search queries.\u00a0<\/li>\n\n\n\n<li>Search engines for misconfigured or unprotected internet-connected devices like Shodan.<\/li>\n\n\n\n<li>Internet record listings like WHOIS Lookup to see who is behind a specific domain name.\u00a0<\/li>\n\n\n\n<li>Data mining tools like Maltego.<\/li>\n\n\n\n<li>Network scanning tools like NMAP.\u00a0<\/li>\n\n\n\n<li>Tools that automate the process of gathering intelligence, like the Python-based Spiderfoot (available on Windows, Linux, and Mac OS).\u00a0<\/li>\n\n\n\n<li>Other tools like ExifTool for extracting metadata from images.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>A popular OSINT methodology for finding free OSINT techniques (public records, data brokers, search engines, forums, blogs, social networks, WHOIS, the dark web, etc.) and OSINT data is the <a href=\"https:\/\/osintframework.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">OSINT framework<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"707\" height=\"605\" src=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/5KpkRe67EzWQv7wTRnC0RCg5fw3AIQ_TYN9dWEjG0MOVpUZ3sDQW_fvse0APBHPaj9z8MUDB3YESg_u2vgd27ooV8kvoQqkuJ48ovGOTwZbyid3FZeCD21qbxYJx-1024x877_69.png\" alt=\"OSINT framework\" class=\"wp-image-10209\" srcset=\"https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/5KpkRe67EzWQv7wTRnC0RCg5fw3AIQ_TYN9dWEjG0MOVpUZ3sDQW_fvse0APBHPaj9z8MUDB3YESg_u2vgd27ooV8kvoQqkuJ48ovGOTwZbyid3FZeCD21qbxYJx-1024x877_69.png 707w, https:\/\/joindeleteme.com\/wp-content\/uploads\/2024\/04\/5KpkRe67EzWQv7wTRnC0RCg5fw3AIQ_TYN9dWEjG0MOVpUZ3sDQW_fvse0APBHPaj9z8MUDB3YESg_u2vgd27ooV8kvoQqkuJ48ovGOTwZbyid3FZeCD21qbxYJx-1024x877_69-300x257.png 300w\" sizes=\"(max-width: 707px) 100vw, 707px\" \/><\/figure>\n\n\n\n<p>The OSINT framework is continuously updated, and anyone can suggest new resources via the OSINT framework <a href=\"https:\/\/github.com\/lockfale\/osint-framework?tab=readme-ov-file\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub page<\/a>.<\/p>\n\n\n\n<p>OSINT has many use cases aside from cybercrime. It is a practice also used by security researchers, law enforcement agencies, and journalists.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trial and Error<\/h2>\n\n\n\n<p>As noted in a KnowBe4 webinar, \u201c<a href=\"https:\/\/www.knowbe4.com\/osint-with-kevin-mitnick?submissionGuid=b6cdf810-b9fd-4cb4-a2ff-b55128fc25ff\" target=\"_blank\" rel=\"noreferrer noopener\">A Look Behind The Curtain: Open Source Intelligence (OSINT) Hacking Data Sources That Bad Guys Use<\/a>,\u201d finding exploitable, real-time sensitive data during an OSINT investigation is a trial and error process.\u00a0<\/p>\n\n\n\n<p>While some public sources offer up-to-date intel, others might host outdated or wrong data. As a result, attackers will try to connect data points to see what\u2019s likely and what is misinformation.&nbsp;<\/p>\n\n\n\n<p>For example, if you wanted to verify the information on a people search site, you might see if an address they list for an individual is correct by comparing it to an address on a property record database.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Data Brokers Make OSINT Easier<\/h2>\n\n\n\n<p>Any social engineering attack, whether phishing or pretexting, starts with the attacker finding information about the target organization.<\/p>\n\n\n\n<p>Questions like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>What\u2019s the org chart like?<\/li>\n\n\n\n<li>Who are the people working there?<\/li>\n\n\n\n<li>What are their job roles?\u00a0<\/li>\n\n\n\n<li>What entities does the organization work with?\u00a0<\/li>\n\n\n\n<li>What\u2019s the company culture like?\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Knowing the answers to these questions gives cybercriminals a good idea of who has access to what systems, what context would make sense to a target, and whom the email\/text message should come from.&nbsp;<\/p>\n\n\n\n<p>For example, according to <a href=\"https:\/\/osintcurio.us\/2022\/05\/17\/corporate-osint-for-social-engineering\/\" target=\"_blank\" rel=\"noreferrer noopener\">the OSINT Curious Project<\/a>, more conservative organizations with stronger hierarchies might be easier to phish using an authoritarian pretext because they tend to have a \u201cdo and don\u2019t ask\u201d culture.\u00a0<\/p>\n\n\n\n<p>Attackers frequently use LinkedIn and an organization\u2019s website to discover this information.&nbsp;<\/p>\n\n\n\n<p>Other useful resources include Corporate Governance Reports (for company structure), employee review websites like Glassdoor and Indeed (company culture), partner company\/service providers\u2019 case studies (to identify whom to impersonate), and people search sites (to find out a target\u2019s interests and other relevant information&nbsp; that would make the social engineering campaign appear more believable).&nbsp;<\/p>\n\n\n\n<p>Once threat actors know whom they want to go after, they will try to figure out their targets\u2019 contact details, i.e., their email addresses and phone numbers. After all, if an attacker can\u2019t reach their target, they can\u2019t attack them.&nbsp;<\/p>\n\n\n\n<p>There are many ways for cybercriminals to find out someone\u2019s email address or phone number. Using people search sites\/data brokers is one of them. Data brokers like Spokeo have both personal and professional phone numbers and emails. They pull the latter from business directories.&nbsp;<\/p>\n\n\n\n<p>Unsurprisingly, ransomware groups <a href=\"https:\/\/www.varonis.com\/blog\/contileaks\" target=\"_blank\" rel=\"noreferrer noopener\">like Conti<\/a> have been proven to use data broker sites like SignalHire to gather information on targets, including contact information and contacts to \u201cname drop\u201d within phishing campaigns to make them look more legitimate.\u00a0\u00a0<\/p>\n\n\n\n<p>Data brokers are a particularly valuable part of anyone\u2019s OSINT toolkit because:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>According to our data, the level of personal information that data brokers have on individuals is continuously expanding as people spend more time on the internet. In the past, people search sites were populated primarily by \u201cdirectory-style\u201d data points, i.e., phone numbers, addresses, etc. Today, they include personal details like data on employees\u2019 relationships, interests, and even IP addresses. Recent research shows that <a href=\"https:\/\/www.corporatecomplianceinsights.com\/cyber-risk-board-personal-devices-home-networks\/\" target=\"_blank\" rel=\"noreferrer noopener\">40% of data brokers<\/a> have executives\u2019 home network IP addresses.<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>Many people search sites allow anyone to see at least some of the information they have on an individual for free. Moreover, only a limited number of data brokers carry out background checks, so it\u2019s easy for malicious actors to use their services.<br><\/li>\n\n\n\n<li>Even when people opt out of these databases, people search sites usually continue with their data collection and re-upload their profiles a few months later. As a result, data broker removal needs to be continuous. However, few people opt out of data brokers regularly because the process is time-consuming and frequently differs from one broker to the next. <a href=\"https:\/\/medium.com\/the-first-digit\/osint-how-to-find-information-on-anyone-5029a3c7fd56\" target=\"_blank\" rel=\"noreferrer noopener\">One OSINT guide<\/a> explains how this can be used to the attacker\u2019s advantage: \u201cOne of the methods to find people that opted out is to go the people search service, find a unique paragraph, do a quoted Google search on it, and find all of the domains that the company owns. There are chances that information your target removed from site A is now on site B.\u201d\u00a0<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Managing Your Organization\u2019s OSINT Footprint&nbsp;<\/h2>\n\n\n\n<p>What would you discover if you used open-source intelligence tools and techniques to look for human targets within your organization? An employee\u2019s phone number? That your colleague is into gourmet coffee? The name of the CEO\u2019s spouse and children?<\/p>\n\n\n\n<p>Whatever information you find, threat actors can also see it. As attacks become more personalized, companies must work on shrinking their employees\u2019 digital footprints and removing as much public data about them as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reconnaissance is how most cyber attacks start. Open-source intelligence (OSINT) is a powerful, free, and common way for cybercriminals to conduct reconnaissance. In an interview with the YouTube channel Russian OSINT, a ransomware group LockBit 2.0 member alluded to using OSINT tools and techniques throughout their attacks. We also know that the now-defunct Conti group [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":7516,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"b2b-category":[45],"class_list":["post-7514","b2b-post","type-b2b-post","status-publish","format-standard","has-post-thumbnail","hentry","b2b-category-resources"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/b2b-post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/16"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-post\/7514\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/7516"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=7514"}],"wp:term":[{"taxonomy":"b2b-category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/b2b-category?post=7514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}