Social Engineering

What is Social Engineering?

Share this post on:

Most social engineering attacks rely on actual communication between attackers and victims. The attacker tends to motivate the user into compromising themselves, rather than using brute force methods to breach your data.

The attack cycle gives these criminals a reliable process for deceiving you. Steps for the social engineering attack cycle are usually as follows:

  • Prepare by gathering background information on you or a larger group you are a part of.
  • Infiltrate by establishing a relationship or initiating an interaction, started by building trust.
  • Exploit the victim once trust and a weakness are established to advance the attack.
  • Disengage once the user has taken the desired action.

This process can take place in a single email or over months in a series of social media chats. It could even be a face-to-face interaction. But it ultimately concludes with an action you take, like sharing your information or exposing yourself to malware.

It’s important to beware of social engineering as a means of confusion. Many employees and consumers don’t realize that just a few pieces of information can give hackers access to multiple networks and accounts.

By masquerading as legitimate users to IT support personnel, they grab your private details — like name, date of birth or address. From there, it’s a simple matter to reset passwords and gain almost unlimited access. They can steal money, disperse social engineering malware, and more.

Profile Pic CM

Author: Craig Mayo

An ITC Lead that has had over 20 years experience in the field of networking, computer maintenance and repair, with security as part of the package in user training and understanding.

View all posts by Craig Mayo >