🔍
How hackers take over your accounts using social engineering (Marketplace) - YouTube
Channel: CBC News
[0]
♪ ♪
[3]
-[ Charlsie ] We're about
to test one of Canada's
[5]
largest telcos.
[10]
My name is Charlsie.
[12]
-[ Charlsie ] These two ethical
hackers, Joshua Crumbaugh and
[15]
Alex Heid, are
taking on my identity,
[18]
so they can take
over my account.
[24]
Yeah, it's 1234.
[27]
-[ Charlsie ] What you're
watching is called
[28]
social engineering.
[30]
I wanted to add HBO
to my account.
[33]
-[ Charlsie ] A hack that relies
on charm and persuasion to get
[36]
access to your info,
and even your money.
[41]
[ ♪♪ ]
[44]
-[ Charlsie ] Erynn Tomlinson
never thought she would be
[46]
a victim.
[47]
She's a former cryptocurrency
exec who thought her info was
[50]
secure from hackers.
But that wasn't the case.
[54]
When did you
know you'd been hacked?
[57]
Well, I was out and my service
cut out on my phone.
[60]
I went to a local
cafe that I always go to.
[64]
One of the first things I did
when I got there was check one
[66]
of my financial accounts,
and I saw it was at zero.
[71]
That was the moment that I
realized what was happening.
[75]
I rushed home so that I could
be at my desktop where I had the
[77]
most control.
[79]
And then it was-- it was a race,
[81]
and it was right at the moment
where they took out the last
[84]
transaction that I saw go
through that I effectively
[86]
blocked them.
[88]
You basically watched
yourself get hacked?
[90]
Yes.
[92]
-[ Charlsie ] As
far as she can tell,
[93]
the only information
the hackers had?
[95]
Erynn's name and phone number.
[97]
And that was
enough to take it all.
[99]
It was $30,000
equivalent in crypto.
[102]
I was closing a
mortgage weeks later.
[107]
So, that's-- that's
what that money was for.
[110]
-[ Charlsie ] So how
did it all unfold?
[112]
Someone or someones
contacted Rogers through chat
[116]
message through their
online support system.
[118]
Right.
[119]
And pretending to be
me with very little information,
[122]
they proceeded to ask
Rogers for information about me.
[126]
And each time they got one piece
of information they would say,
[129]
"Thank you, I got
what I needed."
[131]
They would end the chat
get a new agent and start
[133]
all over again.
[135]
-[ Charlsie ] Erynn got
her hands on those chats.
[137]
She couldn't believe how
easily Rogers gave away all
[140]
her information.
[142]
They were given my
account number,
[144]
my email, my credit
card information,
[149]
my birth date, the amount
of data on my account,
[153]
my last bill amount.
[155]
-[ Charlsie ] It takes
8 different chats,
[157]
but eventually the hackers
convince the employee to
[160]
deactivate Erynn's SIM
card and activate a new one.
[165]
It's called a SIM swap and gives
hackers access to all your apps
[170]
and financial accounts.
[172]
I don't know
how to describe it.
[176]
I was sort of in shock
at the whole thing.
[179]
-[ Charlsie ] Erynn's case
might sound extreme,
[181]
but she's not alone.
[186]
In 2017, TELUS gave out one
customer's personal info to her
[191]
stalker, putting her info
and her security at risk.
[196]
Just three months ago, the
government ordered all companies
[198]
to report all hacks to
Canada's privacy commissioner.
[202]
Since then, there have been over
a dozen cases involving social
[205]
engineering in the
telco sector alone.
[209]
And companies around the world
admit social engineering attacks
[213]
are on the rise.
[216]
We're in New York City about
to meet with some cyber security
[220]
pros who are going to tell us
and show us just how hacking can
[224]
hurt us all and what
we can do to stop them.
[228]
[ ♪♪ ]
[233]
One of my email accounts
has been compromised.
[235]
[ ♪♪ ]
[238]
This is what the bad guys do.
[239]
They actually spend time
trying to force errors.
[242]
This is Infosecurity
North America.
[245]
Dozens of experts, hundreds of
enthusiasts finding flaws in
[249]
security systems, and showcasing
solutions all in one place.
[254]
[ ♪♪ ]
[258]
-[ Charlsie ] From videos
that teach you how to avoid
[260]
getting hacked.
[261]
The biggest threat for an
organization is your users.
[263]
We call it the human firewall.
[265]
Instead of a user blindly
clicking on links or opening
[268]
attachments, we want to train
that user to take a moment,
[270]
think about what
they're going to do,
[272]
and then actually
make a decision,
[274]
an informed decision.
[276]
-[ Charlsie ] To interactive
games like squashing bad
[278]
computer bots.
[280]
So we're differentiating
bad bots from humans,
[282]
and so as you play, you'll
see bots light up in random
[286]
locations, and you
have to smash the bots.
[291]
This is so hard!
[293]
It's pretty hard, right?
[294]
Top three!
[297]
-[ Charlsie ] There's even a
security-themed escape room!
[300]
Okay.
[301]
An escape room?
[302]
What does this have to do
with social engineering?
[304]
So we do immersive
security awareness training.
[307]
So the first code for
the routers is B124.
[311]
So in this room, there's a bunch
of puzzles that have to do with
[314]
helping people understand what
social engineering is and how
[317]
they can better
protect themselves.
[320]
-[ Charlsie ] These guys
are at the conference too.
[321]
They're ethical hackers ready
to use their skills on my cable
[325]
provider, Rogers.
[327]
It's just psychology,
so if you understand how
[330]
somebody's going to
react to something,
[331]
you can easily manipulate
somebody into giving them
[336]
information or access to things
that maybe they shouldn't.
[338]
Okay. Let's give it a
go, guys.
[340]
I'm going to
call this number.
[341]
It will look as if
I'm calling from you,
[343]
and I am Matthew,
your personal assistant.
[347]
-[ Charlsie ] Will
the rep fall for it?
[355]
Well, my name is Matthew.
[357]
I'm calling on
behalf of my boss.
[360]
I'm her personal assistant.
[362]
Her name, though,
is Charlsie Agro.
[365]
Basically, she's asked me to
call and get HBO added and also
[372]
just verify a couple
things about her account.
[384]
-[ Charlsie ] First call and
this employee is not buying it.
[388]
If at first you
don't succeed,
[390]
just hack, hack again?
[391]
Think of how many people
work there, though.
[393]
You only need one
out of a group.
[395]
-[ Charlsie ] So Joshua
tests a new Rogers rep.
[402]
-[ Charlsie ] The same
old trick with a twist.
[405]
This time, he's
impersonating me.
[407]
My name is Charlsie.
[410]
Agro.
[413]
I'm doing well.
[417]
Yeah, I wanted to
add HBO to my account.
[424]
Yeah, it's 1234.
[431]
That's normally
the one I use.
[433]
Let's try 0246.
That's the other one
[438]
-[ Charlsie ] Wrong pin but
the rep doesn't flag it.
[441]
Strike one.
[454]
Date of birth is [ Bleep ].
[457]
-[ Charlsie ] After a
quick search online,
[459]
they find a postal code.
[462]
Okay.
[463]
Yeah, there we are.
It's [ Bleep ].
[465]
-[ Charlsie ] They're
off by a digit,
[466]
but the Rogers rep doesn't
catch that mistake either.
[469]
Strike two.
[475]
It should be [ Bleep ]@gmail.
[479]
-[ Charlsie ] And this
is where it gets scary.
[482]
Could we set a passcode,
as long as we're in here?
[493]
Yeah, let's make it 0246.
[500]
You'll want to change
that right away afterwards.
[503]
-[ Charlsie ] Hard to believe,
he actually changes the passcode
[506]
on my account.
[507]
A serious strike 3.
[513]
And the game's
not over yet.
[515]
He even adds his own
security question.
[521]
We'll go with name
of the first pet.
[529]
It was Rufus, R-U-F-U-S.
[533]
-[ Charlsie ] And just when you
think it can't get any worse,
[536]
he adds himself to my account.
[540]
All right.
[541]
And while I'm at it, could I add
my personal assistant as a level
[543]
one user?
[551]
His name is Joshua.
[557]
Last name Crumbaugh.
[562]
-[ Charlsie ] The rep on the
phone even starts volunteering
[565]
information, including the
other name on my account.
[577]
Yeah, yeah, that's her.
[579]
My husband.
[582]
-[ Charlsie ] And just like
that, the damage is done.
[588]
So I'm shocked because
you actually got my
[591]
postal code wrong.
[592]
It was off by a digit, and
they still let you do that.
[597]
So based on-- so again it's
all about the profile of the
[600]
person who picks up.
[601]
I think the biggest
thing is education.
[604]
We have got to do more in making
our people aware that these
[608]
things happen.
[610]
-[ Charlsie ] This
is your "Marketplace".
[613]
-[ Charlsie ] It's
the latest con game.
[615]
Everyone's always
going to get hacked.
[617]
It's just a matter
of when that happens,
[619]
not if that happens.
[620]
Could we set a passcode,
as long as we're in here?
[623]
Yes.
[625]
-[ Charlsie ] We're revealing
how hackers can use their skills
[627]
to con companies into
giving it all away.
[634]
At this security
conference in New York,
[635]
the ultimate headliner is one of
the world's most famous hackers,
[639]
Kevin Mitnick.
[641]
-[ Kevin] I was on a trophy hunt
to see how many companies
[642]
I could hack into.
[645]
-[ Charlsie ] Once a conman and
one of the FBI's most wanted,
[646]
he hacked into 40 big companies,
even went to prison for
[650]
five years.
[651]
Not for their
information, per se.
[654]
It was the challenge of
getting through their security.
[656]
So, for me, it was all about
the pursuit of knowledge and
[659]
the seduction of adventure.
[660]
It was never about
causing any harm,
[662]
never about making any money.
[664]
-[ Charlsie ] Now, he's flipped,
using his hacker skills to train
[667]
companies on how to protect
you from people like him.
[671]
What is it about human
nature and the goals of
[674]
customer service
that make people,
[676]
organizations, vulnerable when
it comes to social engineering?
[679]
Well, customer
service, you know,
[681]
it's all about
customers is the king,
[683]
and customer service is gonna
bend over backwards to make the
[686]
customer happy.
[688]
-[ Charlsie ] Mitnick says part
of the problem is those security
[690]
questions many
companies use to verify you.
[694]
The companies need to have
policies put into place to come
[697]
up with a way to have a very
high confidence that they're
[700]
dealing with the consumer.
[702]
They're the ones that are in
control because they are the
[704]
ones that can effect change.
[705]
The consumer can't.
[707]
The consumer can
only demanded change,
[708]
and if they are
unwilling to do it,
[710]
you go to a different vendor.
[713]
-[ Charlsie ] Social engineering
victim Erynn Tomlinson agrees.
[716]
She says Rogers should have
done more to protect her info.
[720]
What did they offer you?
[721]
They offered me, at first,
three months' free service.
[725]
Sorry.
[726]
Three months of free service?
[728]
After losing...
[730]
$30,000.
[731]
And then they-- you
know, obviously I said,
[733]
"I don't think
that's appropriate."
[735]
They came back to
me, again, and said,
[738]
"Um, okay, you
know, you're right.
[740]
"We're gonna offer you one year
of free service," to which I
[743]
said, "I feel like that is a
joke at my expense."
[746]
-[ Charlsie ]
Erynn's not giving up.
[748]
She's now suing Rogers.
[750]
What I really want to see
is, not just that they give
[753]
platitudes and say, "Oh,
we're sorry this happened" from
[756]
a customer service point of
view, but that they make real
[759]
changes to their policies and
their training internally,
[763]
so that this can't happen.
[765]
Rogers declined to speak
to us about Erynn's case
[768]
as it's before the courts but
argue they're not responsible
[771]
for what happened to her.
[772]
They do say they provide ongoing
training for their staff and
[776]
take their customer's privacy
and security very seriously,
[780]
always improving and updating
their security measures and
[784]
verification processes.
[786]
Rogers does admit those steps
were not followed properly by
[790]
the customer service rep
when my account was hacked.
[796]
Do you think your members
right now are doing a
[798]
good job protecting
customers' privacy?
[801]
I think they are.
[803]
-[ Charlsie ] Meet Robert Ghiz.
[804]
He's the head of the Canadian
Wireless Telecommunications
[807]
Association, an industry group
representing some of the
[810]
big telcos.
[812]
I think they're putting
mechanisms in place,
[814]
that they are training
and educating,
[817]
but the difficulty is staying
ahead of the fraudsters.
[821]
I know they're good.
You know how I know?
[823]
We had two ethical hackers.
They got into my Rogers account.
[829]
They had the wrong PIN number.
[830]
They had the wrong postal code.
[832]
And they still got in, so that's
troubling for me as a consumer.
[836]
But I want to know how
troubling it is for you.
[838]
Well, obviously we
want to protect our members.
[843]
It's something
that's important to them,
[844]
and that's why they will
continue to educate they will
[846]
continue to train.
[847]
But there's always
going to be human error.
[850]
There's always going to
be fraudsters out there.
[852]
It's up to all industries to
ensure that they do the best to
[856]
protect individual security with
a constantly evolving technology
[863]
that is only going to
grow in the future.
[866]
Experts have been
really clear with us.
[867]
We need to move away from
using personal information
[870]
to authenticate or
validate a user.
[874]
When are you going to stand
up to telco companies and say,
[877]
"Let's make a change?
This isn't working?"
[880]
Well, that's only one
portion of what they do,
[883]
whether it's asking
birthday, asking your address,
[887]
that's why they're adding pins,
passwords, security questions.
[891]
Even though these have
these measures in place,
[895]
it doesn't seem to matter.
[898]
They're not working.
[900]
They got in anyway.
[902]
They are working.
[903]
The thing is there's
millions of calls--
[904]
It didn't work for me
[905]
There's millions of calls
that come in every week.
[907]
There's always going to be
some human error that's going to
[911]
exist, but you're right.
[913]
It's gotta be about educating
those front line services and
[915]
training those
front line services,
[918]
and that needs to continue and
needs to be more vigilant in
[921]
the future.
[923]
[ ♪♪ ]
[925]
-[ Charlsie ] Ethical hackers
Joshua and Alex agree.
[927]
Companies shouldn't be asking
for personal information to
[931]
verify us but say we shouldn't
make it too easy for hackers by
[935]
sharing too much ourselves.
[937]
So many people will use their
children's names or birthdates,
[941]
or their animals
names as passwords.
[944]
And then you go onto
their social media,
[946]
and they've posted a million
pictures of the same dog with
[950]
the name of their dog.
[951]
And they're basically putting
their passwords out there for
[953]
everyone to see.
[955]
-[ Charlsie ] Is he right?
[956]
Do we really share too much?
[957]
[ ♪♪ ]
[961]
-[ Charlsie ] We're taking that
question to the streets.
[963]
-[ Charlsie] What kind of
password do you have?
[965]
Like a dog's name, birthdate?
[967]
I do use my dog's name.
[969]
-[ Charlsie] Oh, what kind
of a dog do you have?
[971]
I have a shih-poo.
[973]
-[ Charlsie] Aww.
What's his name?
[975]
[ Bleep ]
[977]
-[ Charlsie] What security
question would you choose?
[978]
My mother's name.
[979]
-[ Charlsie] What's
your mom's name?
[980]
Can I reveal that?
[982]
Okay, my mom's
name is [ Bleep ].
[984]
-[ Charlsie] So your security
answer would be [ Bleep ]?
[987]
Yes.
[989]
-[ Charlsie] How strong do you
think your online password is?
[991]
Very, very strong.
[992]
It's a name that
nobody would guess.
[994]
-[ Charlsie] So, like,
your partner's name?
[997]
Yeah, something like that.
[998]
-[ Charlsie] What's
your partner's name?
[999]
I can't-- I can't say.
[1000]
-[ Charlsie] Why?
[1001]
[ Bleep ]
[1003]
-[ Charlsie] So your password
is [ Bleep ] plus a bunch
[1004]
of numbers?
-Yes, yes, it is.
[1007]
-[ Charlsie] Thank
you very much.
[1008]
Thank you, yeah.
[1010]
-[ Charlsie] Please go
change your password!
[1012]
Have a good one, guys.
Take care.
[1014]
-[ Charlsie ] I've
changed my password.
[1017]
And now it's up to companies
to change their practices.
Most Recent Videos:
You can go back to the homepage right here: Homepage





