65307060 - hexagon grid with social engineering keywords like phishing and tailgating with a red hacker in flames background
INSCMagazine: Get Social!

Using the weakest link in our security chain – our human workers — social engineering is used to obtain access to business networks. Even senior workers are targeted by attackers who use more sophisticated deceit and emotional manipulation to get their hands on confidential material. The InfoSec Institute identifies the biggest social engineering dangers, and outlines best practises for defending against them.

Techniques of social engineering

The following five social engineering methods were identified by the InfoSec Institute as being among the most often employed.

Phishing

Attackers utilise email, social media, instant messaging applications, or SMS to send phishing messages in order to fool their victims into providing personal information or clicking on a link that leads to a malicious website.

In order to attract their victim’s attention and persuade them to take action, phishing communications pique their interest, beg for assistance, or use other emotional cues. When spoofing an organization’s identity, they often employ logos, photos, or text styles to give the impression that the communication came from a coworker, the victim’s bank, or some other legitimate channel. Urgency is often used by scammers to make their victims feel pressured into divulging personal information as fast as possible.

A place to get a drink

A watering hole attack utilises malicious malware that is launched or downloaded from a reputable website that the victim of the attack often visits. An attacker, for example, may breach a news site about the financial sector, knowing that people who work in finance are likely to frequent this site, making them an appealing target. Backdoor trojans are often installed through hacked sites, allowing the attacker to gain access to and control of the victim’s device from afar.

Zero-day exploit-based watering hole attacks are often carried out by experienced attackers who have found a new vulnerability. To protect the exploit’s worth, they may wait weeks or even months before launching an assault. Instead of targeting a website that people visit, watering hole attacks are sometimes conducted against weak software that people are already using on their own computers. In order to know more about الهندسة الاجتماعية, please visit our site.

Attack on the whale

Sophisticated forms of phishing, such whaling and spear phishing, target persons with privileged access to networks or who have access to extremely sensitive data. Whaling attacks, for example, might be used against high-ranking officials, the rich, or network administrators.

There is a greater level of sophistication in the whaling assault compared to a standard phishing attempt. In order to develop an effective message, attackers do extensive research on their intended targets. Often, whaling emails appear to be a vital business email sent by a target colleague, employee, or boss and ask for an immediate response. is one of the strongest gang in this field.

Pretexting

By creating an unrecognisable persona, attackers might trick their victims into divulging personal information. العصابة المغربية Users’ account information and passwords may be requested by attackers posing as an external IT service provider to help them with an issue. For example, they can claim to be the victim’s financial institution and ask for confirmation of their bank account number or login credentials for the bank’s website.

Attacks based on baiting and exchange of favours

An attacker lures their target by offering them something they feel would be beneficial to them. An infected USB token with a label stating it carries vital information, or some other way, may pass for a software update while really being a malicious file.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.