Galaxy Office Automation

11 Types of Social Engineering Attacks

Using deception and manipulation, social engineering attacks induce the target into doing something that an attacker wants. The social engineer may use trickery, coercion, or other means to influence their target.

The Social Engineering Threat

A popular conception of cyberattacks is that they involve a hacker identifying and exploiting a vulnerability in an organization’s systems. This enables them to access sensitive data, plant malware, or take other malicious actions. While these types of attacks are frequent, a more common threat is social engineering. In general, it is easier to trick a person into taking a particular action — such as entering their login credentials into a phishing page — than it is to achieve the same objective through other means.

11 Types of Social Engineering Attacks

Cyber threat actors can use social engineering techniques in various ways to achieve their goals. Some examples of common social engineering attacks include the following:

  1. Phishing: Phishing involves sending messages designed to trick or coerce the target into performing some action. For example, phishing emails often include a link to a phishing webpage or an attachment that infects the user’s computer with malware. Spear phishing attacks are a type of phishing that targets an individual or small group.
  2. Business Email Compromise (BEC): In a BEC attack, the attacker masquerades as an executive within the organization. The attacker then instructs an employee to perform a wire transfer sending money to the attacker.
  3. Invoice Fraud: In some cases, cybercriminals may impersonate a vendor or supplier to steal money from the organization. The attacker sends over a fake invoice that, when paid, sends money to the attacker.
  4. Brand Impersonation: Brand impersonation is a common technique in social engineering attacks. For example, phishers may pretend to be from a major brand (DHL, LinkedIn, etc.) and trick the target into logging into their account on a phishing page, providing the attacker with the user’s credentials.
  5. Whaling: Whaling attacks are basically spear phishing attacks that target high-level employees within an organization. Executives and upper-level management have the power to authorize actions that benefit an attacker.
  6. Baiting: Baiting attacks use a free or desirable pretext to attract the interest of the target, prompting them to hand over login credentials or take other actions. For example, tempting targets with free music or discounts on premium software.
  7. Vishing: Vishing or “voice phishing” is a form of social engineering that is performed over the phone. It uses similar tricks and techniques to phishing but a different medium.
  8. Smishing: Smishing is phishing performed over SMS text messages. With the growing use of smartphones and link-shortening services, smishing is becoming a more common threat.
  9. Pretexting: Pretexting involves the attacker creating a fake scenario in which it would be logical for the target to send money or hand over sensitive information to the attacker. For example, the attacker may claim to be a trusted party who needs information to verify the victim’s identity.
  10. Quid Pro Quo: In a quid pro quo attack, the attacker gives the target something – such as money or a service – in exchange for valuable information.
  11. Tailgating/Piggybacking: Tailgating and piggybacking are social engineering techniques used to gain access to secure areas. The social engineer follows someone through a door with or without their knowledge. For example, an employee may hold a door for someone struggling with a heavy package.

How to Prevent Social Engineering Attacks

Social engineering targets an organization’s employees rather than weaknesses in its systems. Some of the ways that an organization can protect against social engineering attacks include:

Author: Jeremy Fuchs 

Source: https://www.avanan.com/blog/11-types-of-social-engineering-attacks

FOR A FREE CONSULTATION, PLEASE CONTACT US.