Blog | G5 Cyber Security

Social Engineering Explained

Dear Valued Member,

Your account has been blocked due to the number of invalid login attempts. To regain access please reply with your account number and your date of birth for verification purposes.

We apologize for any inconvenience this may cause as we work to enhance your personal experience.

Above is a social engineering tactic.

 

What is Social Engineering?

Social Engineering is the art of psychological manipulation to trick users into divulging confidential information or taking a compromising action. The ideology behind social engineering is to take advantage of the victim’s natural tendencies and emotional reactions. Once the data is obtained, it is used to gain access to systems and carry out actions that include stealing the victim’s identity and valuables.

 

How does Social Engineering Work?

Social engineering is popular and highly efficient. Attacks can occur in person, over the phone and Internet, and via email. The attacks of social engineers rely on communication between the victims and themselves.

According to Kaspersky.com, Social engineer’s attack cycles give way for successful deception. This cycle includes:

  1. Preparing by gathering background information on the victim or a larger group.
  2. Infiltrate by establishing a relationship or initiating interactions by building trust
  3. Exploit the victim once trust and weakness are established.
  4. Disengage once the user has taken the desired action

The process can take place from a single email or over months in social media chats. Social engineers can masquerade as legitimate employees to gain access to sensitive information.

 

illustration of the Social Engineering Life Cycle (n.d) https://www.imperva.com/learn/wp-content/uploads/sites/13/2019/01/social-engineering.png

 

Social Engineering Principles

Many principles enable social engineering. These include but are not limited to:

Example: While the CEO is in an important meeting, a caller informs the secretary that their domain name needs to be renewed in the next 30 minutes for $USD50 or the company will lose it. Without the domain name, the company website and email addresses will not operate. Because the secretary cannot disturb the CEO, the purchase for the domain name renewal is made.

 

Types of Social Engineering Attacks

 

How to Protect against Social Engineering

 

References


Contributed by Racquel Bailey from Jamaica. Racquel is a member of WISC (Women in InfoSec Caribbean), a Discord group for Caribbean women and girls to develop a career in Information Security.

Learn more about WISC and how at wisc.g5cybersecurity.com.

Exit mobile version