Skip to main content

Social Engineering

What Is Social Engineering?

Manipulating people into revealing information or performing actions that compromise security. Exploits human psychology, not technical vulnerabilities.


Core Principles Used

PrincipleHow It’s Exploited
AuthorityImpersonate executives, IT, law enforcement
Urgency”Act now or your account will be closed”
Scarcity”Limited time offer / access”
Social proof”Everyone else has already done this”
Liking/TrustEstablish rapport before the ask
ReciprocityDo a favor first, then ask for something
IntimidationThreatening consequences

Phishing Variants

AttackDescription
PhishingMass deceptive emails to harvest credentials or install malware
Spear phishingTargeted phishing using personal/organizational info
WhalingSpear phishing targeting C-suite executives
VishingVoice phishing via phone call
SmishingSMS-based phishing
PharmingRedirects users from legit site to fake one (DNS poisoning)
Angler phishingFake social media customer service accounts

Business Email Compromise (BEC)

Attacker impersonates a trusted figure (usually an exec) to trick employees into transferring money or sensitive data.

Common BEC scenarios:
- CEO fraud: "Wire $50K to this vendor immediately"
- Invoice fraud: Attacker intercepts/replaces invoice with their account
- Attorney impersonation: "Urgent legal matter — send funds"
- W-2 scam: "Send all employee W-2s for audit"

Enablers:

  • Compromised email account (account takeover)
  • Spoofed From address (SPF/DKIM not enforced)
  • Domain lookalike (paypa1.com vs paypal.com)

Defenses:

  • DMARC / DKIM / SPF enforcement
  • Out-of-band verification for any wire transfer
  • User awareness training
  • Email banners for external senders

Pretexting

Creating a fabricated scenario (pretext) to extract information.

Examples:
- IT support calling to "fix your account" (needs password)
- Fake survey asking security questions
- Impersonating a vendor to get access credentials

Watering Hole Attack

Compromising a website frequently visited by the target group, then infecting visitors.

Process:
1. Profile target — what sites do they visit?
2. Compromise that site (inject malicious code)
3. Wait for target to visit → drive-by download
Used by: Nation-states targeting specific industries

Impersonation Techniques

TechniqueDescription
Tailgating / PiggybackingPhysically following someone through a secured door
Identity spoofingClaiming to be someone else (phone, email, in-person)
Dumpster divingRecovering sensitive info from trash
Shoulder surfingWatching someone enter a PIN or password
EavesdroppingListening to sensitive conversations

Typosquatting / URL Manipulation

Techniques:
- Typosquatting: gooogle.com, paypa1.com
- Homograph attack: using Unicode characters that look like ASCII
- Subdomain tricks: paypal.com.attacker.com
- URL shorteners to hide destination

Defenses Against Social Engineering

Technical:
- Email authentication (SPF / DKIM / DMARC)
- Web filtering / URL inspection
- MFA (reduces impact of credential theft)
- Spam / phishing filters

Administrative:
- Security awareness training
- Simulated phishing campaigns
- Clear procedures for fund transfers (require voice confirmation)
- Callback verification procedures

Physical:
- Mantrap / access control vestibules
- Visitor badges and escort policies
- Clean desk policy
- Shredding sensitive documents