{"id":77368,"date":"2015-06-30T21:25:01","date_gmt":"2015-07-01T01:25:01","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-08-18T15:42:21","modified_gmt":"2021-08-18T19:42:21","slug":"how-social-engineering-works","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/how-social-engineering-works\/","title":{"rendered":"How Social Engineering Works"},"content":{"rendered":"<p>From where I sit in my <a href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a>, it is<a href=\"https:\/\/web.archive.org\/web\/20150725053533\/http:\/\/blog.willis.com\/2014\/10\/how-hackers-use-social-engineering-to-breach-your-companys-defenses\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-98079 \" title=\"How Social Engineering Works\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/giving-keys.jpg?resize=168%2C104&#038;ssl=1\" alt=\"How Social Engineering Works\" width=\"168\" height=\"104\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/giving-keys.jpg?resize=150%2C93&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/giving-keys.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/giving-keys.jpg?w=645&amp;ssl=1 645w\" sizes=\"auto, (max-width: 168px) 100vw, 168px\" \/><\/a> clear that cyber-attackers will <a href=\"https:\/\/thenextweb.com\/insider\/2015\/06\/19\/this-social-engineering-trick-makes-breaking-into-email-accounts-scarily-easy\/\" target=\"_blank\" rel=\"noopener noreferrer\">try<\/a> <a href=\"http:\/\/www.webroot.com\/us\/en\/home\/resources\/tips\/online-shopping-banking\/secure-what-is-social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">anything<\/a> to penetrate your online security. They will even exploit <a href=\"http:\/\/en.wikipedia.org\/wiki\/Human_nature\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">human nature<\/a> to get access to a firm&#8217;s <a title=\"Digital asset\" href=\"http:\/\/en.wikipedia.org\/wiki\/Digital_asset\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">digital assets<\/a>. In the human world, people who <strong>exploit human nature<\/strong> are often called politicians, <a title=\"Confidence trick\" href=\"http:\/\/en.wikipedia.org\/wiki\/Confidence_trick\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">con-men<\/a>, or grifters. In the digital domain, we call it\u00a0<strong><a title=\"Social engineering (security)\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/social-engineering\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">social engineering<\/a><\/strong>. Most <strong>online attackers<\/strong> use some sort of social engineering to get users to do something risky.<\/p>\n<h3>Social engineering psychological tricks<\/h3>\n<p>Here is a list of 6 <strong>psychological tricks<\/strong> that social engineers use to trick staff.<\/p>\n<p><strong><a href=\"https:\/\/www.infosecurity-magazine.com\/magazine-features\/the-art-of-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98081 \" title=\"psychological tricks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Fakewebsite-e1563735471416-150x117.gif?resize=129%2C101&#038;ssl=1\" alt=\"\" width=\"129\" height=\"101\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Fakewebsite-e1563735471416.gif?resize=150%2C117&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Fakewebsite-e1563735471416.gif?resize=75%2C59&amp;ssl=1 75w\" sizes=\"auto, (max-width: 129px) 100vw, 129px\" \/><\/a>1- Reciprocation &#8211;<\/strong>\u00a0When people are provided with something, they tend to feel obligated and then repay the favor.<\/p>\n<p><strong>2 &#8211; Scarcity<\/strong> &#8211; People tend to comply when they believe something is in short supply. As an example, consider a <a title=\"Email spoofing\" href=\"http:\/\/en.wikipedia.org\/wiki\/Email_spoofing\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">spoof email<\/a> claiming to be from a bank asking the user to comply with a request or else have their account disabled within 24 hours.<\/p>\n<p><strong>3 &#8211; Consistency<\/strong> &#8211; \u00a0Once targets have promised to do something, they usually stick to their promises because people do not wish to appear untrustworthy or unreliable. For example, a hacker posing as a company\u2019s IT team could have an employee agree to abide by all security processes, then ask them to do a suspicious task supposedly in line with security requirements.<\/p>\n<p><strong>4 &#8211; Liking<\/strong> &#8211; Targets are more likely to comply when the <a title=\"Social engineer\" href=\"http:\/\/en.wikipedia.org\/wiki\/Social_engineer\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">social engineer<\/a> is someone they like. A hacker could use charm via the phone or online to win over an unsuspecting victim.<\/p>\n<p><strong><a href=\"https:\/\/tsaoutofourpants.wordpress.com\/2013\/06\/18\/no-surveillance-state-month-part-18-avoid-social-engineering-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98083 \" title=\"stick to their promises\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4.png?resize=95%2C82&#038;ssl=1\" alt=\"stick to their promises\" width=\"95\" height=\"82\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4.png?resize=150%2C129&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4.png?resize=75%2C65&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing4.png?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 95px) 100vw, 95px\" \/><\/a>5 &#8211; Authority<\/strong> &#8211; People tend to comply when a request comes from a figure of authority. So a targeted email to the finance team that appears to come from the CEO or company president will likely prove effective.<\/p>\n<p><strong>6 &#8211;\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Social_proof\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Social validation<\/a> &#8211;\u00a0<\/strong>People tend to comply when others are doing the same thing. For example, a phishing email might look as if it\u2019s sent to a group of employees, which makes each employee believe the message must be valid if other colleagues also received it.<\/p>\n<h3>Conditioned to click<\/h3>\n<p>An article at <em><a href=\"https:\/\/www.helpnetsecurity.com\/2014\/07\/23\/the-psychology-of-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/em> <a href=\"https:\/\/www.proofpoint.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Proofpoint<\/a> argues that humans are <strong>psychologically conditioned<\/strong> (<em>rb- Remember <a href=\"http:\/\/www.simplypsychology.org\/pavlov.html\" target=\"_blank\" rel=\"noopener noreferrer\">Pavlov&#8217;s dogs<\/a> from Pysch 101?<\/em>)\u00a0<strong>to click on links<\/strong>. Cyber-criminals leverage this conditioning by designing phishing emails\u00a0most likely to trigger your automatic click response.<\/p>\n<p><a href=\"http:\/\/betanews.com\/2013\/05\/16\/uk-apprenticeship-scheme-seeks-to-attract-the-young-to-cyber-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-98085 \" title=\"\u00a0Social validation\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing5-e1563735588599-100x150.jpg?resize=69%2C104&#038;ssl=1\" alt=\"\" width=\"69\" height=\"104\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing5-e1563735588599.jpg?resize=100%2C150&amp;ssl=1 100w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing5-e1563735588599.jpg?resize=50%2C75&amp;ssl=1 50w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/phishing5-e1563735588599.jpg?w=376&amp;ssl=1 376w\" sizes=\"auto, (max-width: 69px) 100vw, 69px\" \/><\/a>Proofpoint says that social engineering emails are so convincing and compelling that they fool 10% of recipients into clicking on the malicious link. To put that into context a legitimate marketing department typically expects a &lt;2% click rate on their advertising campaigns.<\/p>\n<h3>Steps to protect against social engineering<\/h3>\n<p>They offer the following suggestions to <strong>protect against social engineering<\/strong> phishing emails:<\/p>\n<ol>\n<li>Understand that you are not being targeted specifically, you and your machine are just <strong>collateral damage<\/strong>.<\/li>\n<li><strong>Upgrade your computer from Windows XP<\/strong> (as Microsoft is no longer providing security updates to the OS) or disconnect it from the internet \u2013 it\u2019s that dangerous.<\/li>\n<li><strong>Don\u2019t use simple predictable passwords<\/strong> that are easy to crack.<\/li>\n<\/ol>\n<p>Businesses need to:<\/p>\n<ol>\n<li>Put in place <strong>layered security<\/strong> to provide an in-depth defense against the latest attacks and malware.<\/li>\n<li>Run <strong>awareness campaigns<\/strong> with your staff telling them not to click on links within social networking emails such as LinkedIn invitations. They should instead open their browser or app, log in, and manage their invites\/messages from there.<\/li>\n<li>Deploy new technologies that combine <strong>big data security analytics with advanced malware analysis.<\/strong> These technologies provide predictive and click-time defense, end-to-end attack campaign insight. They also offer automated incident containment capabilities through connectors to your existing security layers.<\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.cmswire.com\/information-management\/6-ways-to-cope-with-a-scary-social-world\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">6 Ways to Cope With a Scary Social World<\/a> (cmswire.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online con-men use psychological tricks to exploit human nature in social engineering attacks Social validation Reciprocation Liking<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3277,2478,2479,612,2477,4,2481,564,95],"class_list":["post-77368","post","type-post","status-publish","format-standard","hentry","category-security","tag-3277","tag-exploit","tag-human-nature","tag-phishing","tag-psychology","tag-security","tag-social-engineering","tag-social-media","tag-spam"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=77368"}],"version-history":[{"count":5,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77368\/revisions"}],"predecessor-version":[{"id":132325,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/77368\/revisions\/132325"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=77368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=77368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=77368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}