discarded sensitive materials)vendors)target’s email format to craft phishing emails.Discovering personal hobbies or interests to build rapport during pretexting.disguised as an urgent IT notice requesting password resets.call claiming to be from HR asking for verification of sensitive information.Extract the desired information or achieve the attack's goal.
Execution of the attack to achieve the goal (e.g., obtaining credentials)EscalationExtractionMalwareAvoid detection and either sustain access or sever the connection.
destroys evidence of the intrusion.disable fake login pages immediately after collecting credentials.popular Social Engineering Attacks. The attacker sends a fake email to steal from victims. Personal Data
convincing identity or scenario to extract information.fictional backstory
Offering something enticing to lure victims (e.g., USB drops).downloading malware into their systemrevealing confidential personal organisational information.
exploiting trust.
Acting as a trusted individual or authority figure.
Pretending to Be TrustedExploiting Authority and TrustFake Credentials and Contextual Knowledge:

comply with instructions from perceived authority figures."I’m from IT support; I need your password to fix an issue"
immediate action to bypass critical thin`king."Your account will be locked unless you reset your password now!"
Fear of losing a rare opportunity or resource."Limited-time offer! Click here to claim your reward."

Building rapport to gain confidence and cooperation."We’ve worked together before, right? Can you help me with this file?"threats or fear to compel action.Example: "Your data has been breached; pay to recover it."return favours.Example: "I’ve helped you before; can you send me this file?"Steps individuals and organisations can take to minimise risks.