AMZ DIGICOM

Digital Communication

AMZ DIGICOM

Digital Communication

What is tailgaiting?

PARTAGEZ

Tailgating, often overlooked due to the dominance of cyberattack protection, is an underestimated threat to physical security. This physical social engineering technique can pose a significant danger. Unlike scamming, tailgating takes place offline and does not rely on advanced technologies, but it can cause significant damage.

What is tailgating?

Tailgating, like phishing, vishing or smishing, is a social engineering technique. Tailgating involves the use of a secure entry or control point by an unauthorized person, thereby allowingget access to a closed domainThis term, originally from English, describes a situation where one vehicle closely follows another.

A tailgating attack works like this: the attacker positions himself near an authorized person and sneaks up behind them to enter the protected area. This type of attack can occur in a variety of environments such as office buildings, data centers, hospitals, and other security-critical locations. The goal is to steal confidential information or implant malware.

Tailgating attacks are usually organized in a simple way and are based on predictable human behaviorsfor example holding a door out of politeness. Often, attackers will involve someone authorized to enter into brief conversations in order to gain a trust advantage. So this is a method of deception that exploits trust. The basic steps are:

  1. Target identification : the attacker chooses a building or area they want to enter.
  2. Discreet behavior : the perpetrator behaves as if he were part of the establishment.
  3. Take the chance : the person waits for someone with authorized access to open the door.
  4. Access : If the attacker has access to the secure area, he can perform various malicious actions.

However, tailgating attack techniques are as varied as they are audacious and can vary considerably depending on the target. Some of the most common forms include:

  • The dizzy employee : the attacker claims to have forgotten his or her access badge and asks a real employee to let him or her into the building.
  • The emergency situation : The attacker simulates an emergency situation in order to gain access to the victim's mobile device. Once in possession of the phone, he redirects it to dangerous websites from which malware is downloaded, for example spyware.
  • The delivery guy : the person pretends to be a parcel delivery person, carries heavy or bulky objects and waits for someone to hold the door for them.
  • Trainee : the intruder claims to be new to the company and looking for a specific office.
  • The overbooked employee : the person simulates a phone conversation or other distraction to give the impression that he or she is busy and part of the establishment.
  • The visitor : The attacker pretends to have an appointment with a real employee and is allowed to enter the building thanks to a trust bonus.
  • The false identity : by using a forged or stolen ID card, the intruder attempts to deceive security personnel or electronic security systems.
  • The diversion : an accomplice distracts security personnel or collaborators while the perpetrator sneaks into the building.

Tailgating: practical example

A practical example makes it easy to understand how tailgating can be effective and dangerousespecially when people ignore safety protocols or are too naive. He stresses the importance of keeping a constant vigilance in certain areas to prevent such attacks:

The headquarters of a major bank is equipped with the latest security technology and a guard who monitors the main entrance. A malicious person identifies the building as a target and plans to access the bank's internal systems and steal confidential information. The attacker has already discovered that the bank lets external IT technicians in every Thursday for maintenance work. So he gets a uniform resembling that of an IT technician and prepares fake documents and ID cards.

The next day, the attacker approaches the bank building. To appear authentic, he carries a toolbox. At the entrance, he meets a group of real IT technicians. Taking advantage of the opportunity, he joins them and pretends to be part of their team. Since he does not appear suspicious, he freely enters the bank after them. In the building, the attacker asks an employee how to get to a specific server room and pretends to be new to the team. The employee shows him the way. Once in the server room, the laptop can be plugged in to start extracting confidential data. After collecting enough information, the person discreetly leaves the building. Through simple tailgating, the attacker was able to gain physical access to a high-security area without being noticed, and thus steal valuable data.

In order to effectively prevent tailgating attacks, it is essential to implement not only technical measures, but above all staff awareness initiatives. Indeed, this is the problem of layer 8, representing the wrong human behaviorswhich poses the highest risk when attempting tailgating:

  • Training : Employees should be informed about the risk of tailgating and trained in early detection of attacks.
  • Cameras : Surveillance cameras can have a deterrent effect and offer the possibility of investigating possible attacks after the fact.
  • Two-factor authentication : a system requiring both an ID card and a PIN or biometric feature such as a fingerprint can reduce the risk of tailgating.
  • Physical barriers : turnstiles, airlocks or turnstiles that only allow one person to pass through at a time make discreet access more difficult for malicious people.
  • Visitor management : Guests and external service providers should be registered when entering the building and wear a visible visitor badge.
  • Regular inspections of safety measures : regular checks and tests help identify weak points.

For effective protection against tailgating, it is also essential to secure IT systems. This involves, in particular, regular software updatesof the backups according to the 3-2-1 rule as well as secure passwords.

MyDefender from IONOS

Comprehensive Cybersecurity

Protect all your devices from ransomware, viruses, and data loss with intelligent scanning tools and automatic backups.

Télécharger notre livre blanc

Comment construire une stratégie de marketing digital ?

Le guide indispensable pour promouvoir votre marque en ligne

En savoir plus

Souhaitez vous Booster votre Business?

écrivez-nous et restez en contact