discarded
sensitive materials
)vendors
)target’s
email format to craft
phishing
emails.Discovering
personal hobbies
or interests to build rapport during pretexting.disguised
as an urgent
IT notice
requesting password resets.call
claiming to be from HR asking for verification
of sensitive information
.Extract
the desired information
or achieve
the attack's goal
.
Execution
of the attack
to achieve the goal (e.g., obtaining credentials)Escalation
Extraction
Malware
Avoid
detection
and either sustain access or sever the connection.
destroys
evidence
of the intrusion.disable
fake
login pages
immediately
after collecting credentials.popular
Social Engineering Attacks
. The attacker sends
a fake
email to steal
from victims. Personal Data
convincing
identity or scenario to extract
information.fictional
backstoryOffering
something enticing
to lure
victims (e.g., USB drops).downloading
malware into their systemrevealing
confidential personal organisational information
.exploiting
trust
.Acting
as a trusted
individual or authority
figure.
Pretending
to Be TrustedExploiting
Authority and Trust
Fake
Credentials
and Contextual Knowledge:comply
with instructions from perceived authority
figures."I’m from IT support; I need your password to fix an issue"
immediate
action to bypass
critical
thin`king."Your account will be locked unless you reset your password now!"
Fear
of losing
a rare
opportunity or resource
."Limited-time offer! Click here to claim your reward."
Building
rapport
to gain confidence and cooperation
."We’ve worked together before, right? Can you help me with this file?"
threats
or fear to compel
action.Example: "Your data has been breached; pay to recover it."
return
favours
.Example: "I’ve helped you before; can you send me this file?"
Steps individuals and organisations can take to minimise risks.