This CXO panel discussion at VULNCON 2025 explored “The Human Element: Social Engineering in Offensive Security.” Moderated by Divakar Prayaga, the panel featured Rex Pushparaj (Founder & CEO, Rex Cyber Solutions), Navdeep Aggarwal (Product Security Leader, GE Healthcare), and Anant Shrivastava (Founder & Chief Researcher, Cyfinoid Research).
Panelists
- Rex Pushparaj: Founder & CEO at Rex Cyber Solutions, with extensive experience in offensive security engagements and red teaming
- Navdeep Aggarwal: Product Security Leader at GE Healthcare, with 12-15 years of experience managing security for HR functions and healthcare security
- Anant Shrivastava: Founder & Chief Researcher at Cyfinoid Research, specializing in supply chain security, hacking, and development
- Divakar Prayaga (Moderator): Cyber Executive Leader, Startup Mentor & Advisor, background in building cyber defense centers
Key Themes
1. Real-World Social Engineering Attacks
- Supply chain rerouting attack: Adversaries compromised a supply chain company and rerouted an entire consignment intended for South Africa — they activated compromised accounts only during approval moments, then went dormant, making detection extremely difficult
- CCTV and Wi-Fi surveillance: In a Singapore case, attackers sat outside a company compound, accessed their Wi-Fi and CCTV cameras, observed keystrokes and OTP entries for over a month, resulting in $1 million in losses
- Modern social engineering connects people and infrastructure — attackers target both simultaneously rather than just one
2. Healthcare Industry Vulnerabilities
- Healthcare environments are uniquely vulnerable because the primary focus is always patient health — everyone in the ecosystem (patient, family, staff) is under stress and willing to share information without questioning
- Hospitals collect excessive data (Aadhaar, PAN, phone numbers) even for simple OPD visits, building databases that can be exploited
- Attackers can send phishing messages disguised as diagnostic reports via WhatsApp — since patients are already expecting reports, they click without hesitation
- Healthcare social engineering exploits the urgency and trust inherent in medical situations
3. Evolving Attacker Techniques
- Attackers adapt to newer systems faster than defenders — AI-generated profile pictures on Instagram, better-crafted phishing messages with no spelling mistakes or structural errors
- India-specific: Attackers compromise servers of legitimate organizations to use their alphanumeric SMS sender IDs and message templates, making phishing SMS appear authentic
- GitHub and VS Code supply chain attacks: Simply cloning a malicious repository or opening a VS Code project and trusting the author can lead to complete compromise — access to AWS credentials, home directories, and more
- Default corporate passwords (variations of “welcome@123”) remain unchanged for decades, making new employee impersonation trivially easy
4. Cultural Factors in Social Engineering
- India’s trust-based culture makes social engineering significantly more successful compared to other regions
- Indians tend to trust people more with data than with money — personal information is freely shared at photocopy shops, delivery services, etc.
- Saying “no” is culturally difficult — people need to understand that respecting privacy doesn’t mean distrusting the other person
- Contrast with European culture where individuals are far more guarded about sharing personal information
5. HR, Finance, and Sales as Primary Targets
- HR departments hold both PHI (Protected Health Information) and PI (Personal Information) — financial data of every employee including the CEO, and sometimes medical records
- Organizations invest in securing revenue-generating products but neglect protecting HR despite it holding the crown jewels
- HR’s role inherently demands receiving external communications — they cannot flag every external email as suspicious
- Sales teams have even fewer limitations — anyone can approach them as a customer, vendor, or partner
- Executive assistants (PAs) are high-value targets — they have access to C-suite banking details, transaction authority, and confidential conversations
6. CXO Targeting — The New Normal
- Five to seven years ago, reaching a CEO or CXO was extremely difficult
- Today, CXOs must be publicly presentable for brand identity — their information is readily available on LinkedIn, conference websites, and social media
- This makes them easy targets for social engineering, from fake conference invitations to impersonation attacks
7. Defensive Measures and Technology Solutions
- Behavioral pattern analysis: Profile normal user behavior over months — if an HR person opens PowerShell (abnormal behavior), the account gets locked automatically
- Outgoing connection firewalls: Tools like Little Snitch (Mac) or OpenSnitch (Linux) that alert users when an application makes unexpected external connections
- Maker-checker processes and role-based access control as outcomes of deliberate process mapping and categorization
- Anomaly detection helps identify when users deviate from expected behavior patterns
8. Rewarding Good Security Behavior
- Organizations should reward employees who spot phishing rather than only punishing those who fall for it
- Example: A point-based system where every valid phishing email reported earns one point, with quarterly scoreboards and tangible rewards (cash, goodies)
- This transforms phishing detection from a problem into an opportunity — employees become eager to spot suspicious emails
- Over time, over-reporters self-correct — similar to bug bounty hunters fine-tuning their approach to maximize reward for effort
9. Pretexting and Baiting Techniques
- Pretexting: Creating believable scenarios — e.g., posing as a job seeker sharing GitHub links to HR (doubly effective at organizations with referral bonuses, where employees are incentivized to engage)
- Baiting: Playing on emotions, particularly ego — criticizing someone’s work role or product to provoke a reaction; using dating scams (honey traps) where victims are lured to premium cafes and stuck with inflated bills
- Ego-based attacks are highly effective — when someone’s professional competence or work is questioned, defensive reactions override security awareness
10. Red Teaming Ethics and Boundaries
- Reconnaissance starts with privacy and cookie policies — these reveal an organization’s security maturity before any technical testing begins
- Full-privilege red teaming without consolidated scope definition is dangerous — organizations need to clearly define areas to be tested
- Red teamers operate in the defender’s playground — one mistake by an attacker or one alert defender can break the entire attack chain
11. Brand Monitoring vs. Offensive Security
- Large enterprises: Should invest in both red teaming and brand monitoring for comprehensive resilience testing
- Startups: Web-based brand monitoring tools are a more practical starting point; red teaming requires having security baselines in place first
- No red teaming firm offers insurance or 100% coverage guarantees — all reports include disclaimers about point-in-time assessment
12. Insider Threats and the CISO’s Role
- The North Korean hacker hired by a European company case highlighted failures in background verification processes
- Insider threats are among the most severe ways to damage an organization — regardless of level, a malicious insider will make a dent
- CISO may not be directly responsible for a hiring failure, but is accountable for preparing the organization against insider threats
- Clear delineation between responsibility and accountability across the organization is essential
Key Takeaways
- Social engineering remains unsolved by technology — technologists have collectively failed to provide a technical solution to this fundamentally human problem
- Modern attackers connect people and infrastructure — targeting both simultaneously in highly targeted, patient operations
- Cultural awareness is critical — trust-based cultures are more susceptible, and awareness programs must address this at a grassroots level
- Role-specific security training is essential — generic compliance-driven training is ineffective; HR, developers, sales, and CXOs each face unique attack vectors
- Reward good security behavior — transform phishing detection from a burden into an incentive-driven activity
- Supply chain attacks through development tools (GitHub, VS Code) represent a growing and underappreciated threat vector
- Start with fundamentals — get baselines, policies, and role-based access right before investing in advanced red teaming
- The eighth layer of the OSI model is the human — and it remains the weakest link in the security chain
- Every organization must clearly define who is responsible and who is accountable for security outcomes
- One alert defender can break an entire attack chain — invest in making the human element the strongest link, not just acknowledging it as the weakest