9 types of Social engineering attacks

Despite the broad hearsay her, η social engineering is difficult to "formed" or yes summarize. That's him one of the reasons for which 82% of data breaches is man-made.

Social engineering he's got end up to form the backbone of many threats in cyberspace, from the electronics messages Phishing until the attacks smishing and vishing. We will see below The more usual social engineering techniques and the emotions hackers use to trick them victims their.

social engineering

 

Follow nine common threats at cyberspace που they use social engineering techniques and tactics to acquire access to sensitive information (without specific series). The more of these attacks they receive country on internet, but they can same to you to look up to physicists places, such as offices, apartments and coffee shops.

1 Phishing 

She is η more interventional method application social engineering. The hacker they use email messages y, websites and text messages to steal sensitive personal or organizational information from unsuspectingly victims.

The where the techniques below are performed electronics mail Phishing is now known, however one to five employees still clicks on those suspicious links.

2. Spear Phishing

This scam Phishing (electronic post office) it is used for the dismissal targeted attacks against of individuals or businesses. The spear phishing it's more complicated by general massive Phishing via electronics mail and requires thorough research in this respect with the possible goal and the organization of.

 3. Bait 

This type of attack can Happen online or in a physical environment. The Criminals of cyberspace they usually promise something είδος reward into a in return for confidential information or knowledge that possesses the victim.

4. Malicious

Category attacks that include ransomware. To the victims it is sent message me footnote indicating the urgent need installation malicious at device their.

At irony of luck, a ordinary How It Works is to their warn that the malware is already installed on his computer victim and that the sender will remove the software if pay some money.

5. Preface (pretexting)

In him the guy attack, The perpetrators they use fake identities to cheat the victims and to detach information. She η attack is often used from organizations with rich customer data such as banks, financial institutions and businesses general interest.

6. Give and take (Quid Pro Quo)

This attack is focused in instead information or services order to motivate the victim to take action. Usually, The Criminals of cyberspace που they perform this This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. scenario not conduct more advanced and detailed research in this respect with the target, but offered to provide "aid" pretending to be someone else, like one expert technical support.

7. Tailgating

This attack aims anyone allows at perpetrator physical access to one protected or controlled building or space. Very often, these the scams are achieved with the favor of the victim, as This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. to leaves The doors open to allow into a One invisible disguised "employee" to pass.

8.Vishing

In this scenario, the Criminals of cyberspace leave voicemails pretending urgent incidents, convincing victims that they must act quickly to protect themselves from arrest or others risks. The banks, the governmental services and law enforcement agencies is usually victims of imitation into a those scams.

9. Water-Holling (Pit with water)

This attack uses advanced social engineering techniques to infect websites and visitors their with malware. The pollution spreads usually via websites που are related with This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. victim (B.C. are related with the work/labour), such as popular sites που This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. victim visits regularly.

Why do social engineering attacks take place? 

Social engineering it can to succeed its goals because of human instinct of trust. The Criminals of cyberspace have learned that the carefully formulated messages email, the vocals messages and the messages text they can to motivate people to send money, yes provide confidential information or to download archives που settle malware into a a corporate network.

Below is listed a example attempt spear-phishing that forced an employee to transfer 500.000 US dollars to a foreign investor:

  1. Thanks to careful investigations spear-phishing, The cybercriminals achieved to learn that ο directors advisor the company's was located on a business trip.

  2. A employee one company received a message electronics mail που it seems to comes from from the manager consultant. There is a small one difference in the email address, but the spelling of the name of CEO is correct.

  3. In message wanted from their employees to support the manager consultant transporting 500 000 US dollars into a One new foreign investor. The message uses urgent but friendly language and assures their employees that they can to contribute such a at CEO as well as in company.

  4. The message emphasizes that ο directors advisor would do ο own the transport she, but he was also traveling not he could to does in time the transport capital for to ensure the cooperation with the investment.

  5. Without verifying the details, the clerk decided to take on action. Believes sincerely that η compliance with the request that was formulated through the message will help such a the manager advisor, as well as the company and his colleagues.

  6. Few days later, the employee, ο directors advisor and a colleague of the company they fall victims of a social engineering attack, resulting in the loss of $500.000.

Examples of social engineering attacks

The experienced ones Criminals in cyberspace they know that social engineering is more effective when focused in human συναισθήματα and their risks. Η exploitation of human emotions it is much more easy from the search violations network ή vulnerable points security.

Follow some mainly points which they explain why social engineering attacks are repeatedly successful.

Φόβος

You receive a voicemail that he says that is being investigated η case tax fraud and that must call immediately to avoid arrest and criminal investigation. This social engineering attack come true during tax season when people are already stressed for their their taxes.

Cybercriminals are taking advantage of it stress and the αγωνία of submitting the tax return and they use the feeling of fear to cheat victims so that follow voice commands message.

Greed

Imagine to you could transfer 10 dollars electronically to an investor and to them watch to increase in 10.000 dollars without none trial your effort. The Criminals of cyberspace they use the basic human emotions of trust and desire to They do the victims them to believe that they can really to create something out of nothing.

A carefully worded email that acts as a decoy says on victim to give the bank details of account and money transferred later the same day.

Curiosity

The scammers and The Criminals of cyberspace are focused on in events which have a great publicity at people of news and they use the human curiosity to cheat the victims their. For example, after the second crush one aircraft Boeing MAX 8, The cybercriminals they started to they send emails with attachments που they claimed to contain leaked data in this respect with the crash.

This This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. attachment installed a version of the Hworm RAT on the victim's computer.

Providing assistance

People trust and help each other. At the duration one research in a company, The cybercriminals targeted two or three employees with an email that it seems to come from their manager.

The email message he was asking from the responsible information technology to sent the password at accounting basis data, emphasizing that director the was needed order to received in time the salary of.

The message email used the language of urgent, η who did This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. victim to believe that will could to help This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. boss of if was acting quickly.

Emergency situation

You receive an email from customer support into a a electronic store που you are visiting often, on which refers that you should verify your credit card information to protect your account.

The Email your asks to answer quickly to prevent Criminals from This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. to steal your credit card information.

Ως result, This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. another part used your details to carry out markets worth thousands of dollars.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Social engineering

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).