Social Engineering

Social engineering: manipulating emotions and behavior

Social engineering attacks deceive people into sharing sensitive information or taking risks. Individuals and organizations must be more vigilant as these attacks become more frequent and sophisticated. This article covers social engineering attacks like phishing, baiting, quid pro quo, and tailgating, including examples.

Phishing: deceptive gathering of your sensitive data.

Phishing is a popular social engineering method. It involves forging emails, texts, or websites from reputable sources like banks or well-known websites. Fake messages often ask for personal information or direct recipients to a phishing website.

WannaCry ransomware spread via phishing emails in 2017. The email instructed recipients to download malware that encrypted their files and demanded a ransom.

Baiting: Hooking the unwary.

Baiting is leaving an enticing item, like a USB drive, in a public place in hopes that someone will pick it up and insert it into their computer. Malware on the USB drive can infect a computer and steal data.

In 2010, hackers baited an Iranian nuclear research facility to steal sensitive data. The hackers hid infected USB drives in the facility’s parking lot, hoping someone would pick them up and insert them into a computer, spreading the malware throughout the network.

Quid pro quo: help offered for good information.

Quid pro quo attacks involve trading technical assistance for sensitive information. These attacks are often disguised as phone calls from a technical support team requesting access to the victim’s computer.

A 2015 quid pro quo attack stole sensitive data from several US government agencies. The attackers offered technical support to victims. The attackers requested remote access to the victim’s computer to steal sensitive data.

Tailgating is following others into confined spaces.

Tailgating, or piggybacking, is when an attacker follows someone into a restricted area without permission. This method is often used to access sensitive data or systems.

Tailgating stole financial institution data in 2017. Following the employee into a secure area allowed the attacker to access sensitive information.

Social engineering attacks are a sneaky and pervasive threat to personal and organizational security. Understanding and avoiding these attacks can protect us and our data from malicious actors. Stay vigilant—an ounce of prevention is worth a pound of cure!

Leave a comment