Examples of social engineering range from phishing attacks where victims are tricked into providing confidential information, vishing attacks where an urgent and official sounding voice mail convinces victims to act quickly or suffer severe consequences, or physical tailgating attacks that rely on trust to gain physical access to a building.

The nine most common examples of social engineering are:

  1. Phishing: tactics include deceptive emails, websites, and text messages to steal information.

  2. Spear Phishing: email is used to carry out targeted attacks against individuals or businesses.

  3. Baiting: an online and physical social engineering attack that promises the victim a reward.

  4. Malware: victims are tricked into believing that malware is installed on their computer and that if they pay, the malware will be removed.

  5. Pretexting: uses false identity to trick victims into giving up information.

  6. Quid Pro Quo: relies on an exchange of information or service to convince the victim to act.

  7. Tailgating: relies on human trust to give the criminal physical access to a secure building or area.

  8. Vishing: urgent voice mails convince victims they need to act quickly to protect themselves from arrest or other risk.

  9. Water-Holing: an advanced social engineering attack that infects both a website and its visitors with malware.

The one common thread linking these social engineering techniques is the human element. Cybercriminals know that taking advantage of human emotions is the best way to steal.

How Does Social Engineering Happen?

Social Engineering happens because of the human instinct of trust. Cybercriminals have learned that a carefully worded email, voicemail, or text message can convince people to transfer money, provide confidential information, or download a file that installs malware on the company network.

Consider this example of spear phishing that convinced an employee to transfer $500,000 to a foreign investor:

  1. Thanks to careful spear phishing research, the cybercriminal knows the company CEO is traveling.

  2. An email is sent to a company employee that looks like it came from the CEO. There is a slight discrepancy in the email address – but the spelling of the CEO’s name is correct.

  3. In the email, the employee is asked to help the CEO out by transferring $500,000 to a new foreign investor. The email uses urgent yet friendly language, convincing the employee that he will be helping both the CEO and the company.

  4. The email stresses that the CEO would do this transfer herself but since she is travelling, she can’t make the fund transfer in time to secure the foreign investment partnership.

  5. Without verifying the details, the employee decides to act. He truly believes that he is helping the CEO, the company, and his colleagues by complying with the email request.

  6. A few days later, the victimized employee, CEO, and company colleagues realize they have been a victim of a social engineering attack and have lost $500,000.

Examples of Social Engineering Attacks

Social engineering works best when focussing on human emotion and risk. Taking advantage of human emotion is much easier than hacking a network or looking for security vulnerabilities.

These examples of social engineering emphasize how emotion is used to commit cyber attacks:

Fear

You receive a voicemail that says you’re under investigation for tax fraud and that you must call immediately to prevent arrest and criminal investigation. This social engineering attack happens during tax season when people are already stressed about their taxes. Cybercriminals prey on the stress and anxiety that comes with filing taxes and use these fear emotions to trick people into complying with the voicemail.

Greed

Imagine if you could simply transfer $10 to an investor and see this grow into $10,000 without any effort on your behalf? Cybercriminals use the basic human emotions of trust and greed to convince victims that they really can get something for nothing. A carefully worded baiting email tells victims to provide their bank account information and the funds will be transferred the same day.

Curiosity

Cybercriminals pay attention to events capturing a lot of news coverage and then take advantage of human curiosity to trick social engineering victims into acting.

Helpfulness

Humans want to trust and help one another. After doing research into a company, cybercriminals target two or three employees in the company with an email that looks like it comes from the targeted individuals’ manager. The email asks them to send the manager the password for the accounting database – stressing that the manager needs it to make sure everyone gets paid on time. The email tone is urgent, tricking the victims into believing that they are helping out their manager by acting quickly.

Urgency

You receive an email from customer support at an online shopping website that you frequently buy from telling you that they need to confirm your credit card information to protect your account. The email language urges you to respond quickly to ensure that your credit card information isn’t stolen by criminals. Without thinking twice and because you trust the online store, you send not only your credit card information but also your mailing address and phone number. A few days later, you receive a call from your credit card company telling you that your credit card has been stolen and used for thousands of dollars of fraudulent purchases.

How to Protect Against Social Engineering

People affect security outcomes more than technology, policies or processes. The market for security awareness computer-based training (CBT) is driven by the recognition that, without perfect cybersecurity protection systems, people play a critical role in an organization’s overall security and risk posture. This role is defined by inherent strengths and weaknesses: people’s ability to learn and their vulnerability to error, exploitation and manipulation. End-user-focused security education and training is a rapidly growing market. Demand is fueled by the needs of security and risk management (SRM) leaders to help influence the behaviors that affect the security of employees, citizens and consumers.”

To protect against social engineering attacks requires a focus on changing behavior. When company employees understand how easy it is to be tricked or scammed by a social engineering attack, they are more likely to be vigilant and suspicious of emails, voicemails, texts, or other cyber attack approaches.

To effectively protect Tuntex against social engineering requires a focus on :

  1. High Quality Content: engages users and provides a training program that resonates and changes behavior.

  2.  Personalized Campaigns: provide content that employees can relate to and apply to their day-to-day.

  3. Collaborative Partner: work with a partner who uses a consultative approach to understand your unique needs to deliver a custom security awareness program designed specifically for Tuntex.

  4. Security Awareness built on a proven methodological approach to learning and changing behavior.

  5. Security Awareness As A Service: provides flexibility and support to effectively deploy, measure, and report results of phishing simulations, awareness training, and campaign visibility.

How to Stay Protected Against Social Engineering

To stay protected against social engineering attacks, it’s important to recognize the power of ego. Each of us wants to believe that we would never be tricked or scammed by a phishing email or other social engineering attack. However, as we know, cybercriminals rely on all aspects of human emotion and nature to subtly deceive and trick people into acting.

It’s only with first-hand experience of being phished or violated by another social engineering approach that people really appreciate how social engineering works. By awareness that uses phishing simulations, engaging and relevant content, and an understanding of human nature – We can stay protected against social engineering.

 

Tuntex-SYS IT Div Updated 2/15/2019