CCCU

Week-11 Social Engineering (SE)

Course Code: P19133

Course Name: Cybersecurity Fundamentals 

Credits: 20

Module Leader: Ali Jaddoa
CSF-19133
CCCU

Lecture Objectives:

  • Understand what social engineering is and its role in cyberattacks.
  • Identify common social engineering tactics and techniques.
  • Analyse case studies of successful social engineering attacks.
  • Discuss countermeasures and organisational strategies to mitigate social engineering risks.
  • Lab
CSF-19133
CCCU

Introduction to Social Engineering

Social engineering is the art of manipulation of human behaviour to breach security systems.

  • Significance in Cybersecurity
    • Over of cyberattacks involve a social engineering element.
    • Exploiting trust vs. exploiting technology.
  • Why It Works
    • Cognitive biases.
    • Limited cybersecurity awareness.
    • Over-reliance on technology.

1

CSF-19133
CCCU
CSF-19133
CCCU

SE Lifecycle

  1. Research:
    • Open-source intelligence (OSINT) gathering.
    • Identifying vulnerabilities (e.g., social media oversharing).
    • Dumpster Diving (Collecting discarded sensitive materials)
    • Technical Research (vendors)
CSF-19133
CCCU

SE Lifecycle

  1. Research:
    • Examples
      • Identifying a target’s email format to craft phishing emails.
      • Discovering personal hobbies or interests to build rapport during pretexting.
CSF-19133
CCCU

SE Lifecycle

  1. Hook:
    • Establishing initial contact.
    • Phishing Emails
    • Vishing (Voice Phishing)
    • Smishing (SMS Phishing)
    • Baiting
CSF-19133
CCCU

SE Lifecycle

  1. Hook:
    • Example:
      • A phishing email disguised as an urgent IT notice requesting password resets.
      • A phone call claiming to be from HR asking for verification of sensitive information.
CSF-19133
CCCU

SE Lifecycle

  1. Play:Extract the desired information or achieve the attack's goal.
    • Execution of the attack to achieve the goal (e.g., obtaining credentials)
    • Credential Theft
    • Privilege Escalation
    • Data Extraction
    • Planting Malware
CSF-19133
CCCU

SE Lifecycle

  1. Play
    • Example
      • Convincing an employee to wire money to a fraudulent account in a Business Email Compromise (BEC) attack.
      • Installing spyware via an email attachment.
CSF-19133
CCCU

SE Lifecycle

  1. Exit: Avoid detection and either sustain access or sever the connection.
    • Covering Tracks:Deleting logs or hiding malware
    • Sustaining Access: backdoors; long-term infiltration.
CSF-19133
CCCU

SE Lifecycle

  1. Exit
    • Examples
      • After exfiltrating sensitive data, the attacker destroys evidence of the intrusion.
      • In phishing attacks, attackers often disable fake login pages immediately after collecting credentials.
CSF-19133
CCCU

Common Social Engineering Techniques

  1. Phishing: is one of the most popular Social Engineering Attacks. The attacker sends a fake email to steal from victims. Personal Data

width:1OO% center

CSF-19133
CCCU

Common Social Engineering Techniques

  1. Pretexting:
  • Creating a convincing identity or scenario to extract information.
  • Creates a fictional backstory

width:1OO% center

CSF-19133
CCCU

Common Social Engineering Techniques

  1. Baiting:
  • Offering something enticing to lure victims (e.g., USB drops).
  • Tactic tricks the victim into:
    • unintentionally downloading malware into their system
    • revealing confidential personal organisational information.

width:1OO% center

CSF-19133
CCCU

Common Social Engineering Techniques

  1. Tailgating/Piggybacking: Gaining physical access to restricted areas by exploiting trust.

width:1OO% center

CSF-19133
CCCU

Common Social Engineering Techniques

  1. Impersonation: Acting as a trusted individual or authority figure.
    1. Pretending to Be Trusted
    2. Exploiting Authority and Trust
    3. Using Fake Credentials and Contextual Knowledge:
      width:1OO% center
CSF-19133
CCCU

Psychological Principles of Social Engineering

width:1OO% center

CSF-19133
CCCU

Psychological Principles of Social Engineering

Authority

  • People tend to comply with instructions from perceived authority figures.

Example:

  • "I’m from IT support; I need your password to fix an issue"

width:1OO% center

CSF-19133
CCCU

Urgency

  • Creating a sense of immediate action to bypass critical thin`king.

Example:

  • "Your account will be locked unless you reset your password now!"

width:1OO% center

CSF-19133
CCCU

Scarcity

  • Fear of losing a rare opportunity or resource.

Example:

  • "Limited-time offer! Click here to claim your reward."

    width:1OO% center

CSF-19133
CCCU

Trust

  • Building rapport to gain confidence and cooperation.

Example:

  • "We’ve worked together before, right? Can you help me with this file?"
CSF-19133
CCCU

Fear and Reciprocity

Fear:

  • Using threats or fear to compel action.
  • Example: "Your data has been breached; pay to recover it."

Reciprocity:

  • Exploiting the human tendency to return favours.
  • Example: "I’ve helped you before; can you send me this file?"
CSF-19133
CCCU

Real-World Applications of Social Engineering

Case Studies

  1. Target Data Breach (2013):
    • Phishing an HVAC vendor to gain access.
  2. Twitter Hack (2020):
    • Social engineering employees for privileged access.
  3. Google & Facebook (2013–2015):
    • Invoice fraud through email impersonation.
  • Discussion
    • What enabled these attacks?
    • Could they have been prevented?
CSF-19133
CCCU

How can the algorithms that personalise social media content unintentionally make users more vulnerable to social engineering attacks? Can you think of any examples where personalisation could be exploited in this way?

CSF-19133
CCCU

6. Prevention and Mitigation Strategies

Technical Countermeasures

  • Spam filters and email verification tools.
  • Endpoint protection (e.g., USB restrictions).

Human Countermeasures

  • Security awareness training.
  • Regular phishing simulations.
  • Policies for verifying requests (e.g., verbal confirmation).
CSF-19133
CCCU

Organisational Measures

  • Clear incident response plans.
  • Zero Trust approach to access control.

Checklist

Steps individuals and organisations can take to minimise risks.

CSF-19133
CCCU

Lab

  1. Attacks Mapping and Exploring the Social Engineering Toolkit (SET), see lab here
CSF-19133