{"id":82602,"date":"2020-10-03T20:14:08","date_gmt":"2020-10-04T00:14:08","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-12-20T13:26:27","modified_gmt":"2021-12-20T18:26:27","slug":"seven-social-engineering-classics","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/seven-social-engineering-classics\/","title":{"rendered":"Seven Social Engineering Classics"},"content":{"rendered":"<p class=\"align-center\"><a href=\"https:\/\/web.archive.org\/web\/20210506014425\/https:\/\/www.photofunny.net\/cat-celebrities\/nose-glasses-eyebrows-groucho-marx\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-115532\" title=\"Seven Social Engineering Classics\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/imposter-2-e1601746818938-150x125.png?resize=100%2C83&#038;ssl=1\" alt=\"Seven Social Engineering Classics\" width=\"100\" height=\"83\" \/><\/a><strong>Social engineering<\/strong> describes various non-technical attack techniques cybercriminals use to <strong>manipulate users. <\/strong>The attackers hope the user will bypass security or other business process protocols, perform harmful actions, or disclose sensitive information. Beware of these social engineering classics.<\/p>\n<h3>Business Email Compromise<\/h3>\n<p><a href=\"https:\/\/www.marketingprofs.com\/marketing\/library\/articles\/45\/segmentation\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115518\" title=\"Business\u00a0Email\u00a0Compromise\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/email_blast-1.jpg?resize=90%2C73&#038;ssl=1\" alt=\"Business\u00a0Email\u00a0Compromise\" width=\"90\" height=\"73\" \/><\/a>Don&#8217;t get fooled by official-looking emails even though the email appears to be work-related. Subject lines such as &#8220;Invoice Attached&#8221; or &#8220;Here&#8217;s the file you needed&#8221; might be a social engineering classic. To be sure, you should hover your cursor over email addresses and links before clicking to see if the sender and type of file are legitimate. BEC is the <a href=\"https:\/\/www.bankinfosecurity.com\/fbi-bec-losses-totaled-17-billion-in-2019-a-13717\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">most costly form<\/a> of cybercrime. It stems from faked emails called &#8220;<strong>Business Email Compromise<\/strong>&#8221; or BEC scams. A typical BEC scam involves <strong>phony emails<\/strong> in which the attacker\u00a0spoofs a <strong>message from an executive<\/strong> at a company\u00a0and tricks someone into <strong>wiring funds<\/strong> to the fraudsters.<\/p>\n<h3><strong><a href=\"https:\/\/nordvpn.com\/blog\/what-is-vishing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115512\" title=\"Vishing\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/vishing-e1601740904705-111x150.jpg?resize=67%2C90&#038;ssl=1\" alt=\"Vishing\" width=\"67\" height=\"90\" \/><\/a><\/strong>Vishing<\/h3>\n<p>Corporate phone systems are often set up to forward <strong>voice mail audio files <\/strong>to employees&#8217; inboxes. While this is convenient, forwarding the files can be risky. It makes it harder to determine if the email is phony or legit. Since 2014, scammers have been installing malicious software through emails designed to look like internal voicemail messages, making vishing a social engineering classic.<\/p>\n<p>With vishing, cybercriminals use an urgent or alarming voicemail message to try to get potential victims to call back with their personal information. Fake caller ID<strong>\u00a0information<\/strong> is often used to make the calls appear to be from a legitimate organization or business.<\/p>\n<h3>Free Stuff, a social engineering classic<\/h3>\n<p><a href=\"https:\/\/clipart-library.com\/clipart\/1658711.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115513\" title=\"Free pizza\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/pizza_slice-e1601740502707-150x83.jpg?resize=90%2C50&#038;ssl=1\" alt=\"Free pizza\" width=\"90\" height=\"50\" \/><\/a>Free Stuff is one of the oldest social engineering classics. Most people can&#8217;t resist free Stuff, from pizza to software downloads, and they will click just about any link to get it. Of course, nothing is truly free. Sophisticated attackers might send a link to genuine free software, but they&#8217;re sending you through their website, which means you may get<strong>\u00a0infected or compromised<\/strong>.<\/p>\n<h3>Baiting<\/h3>\n<p>Baiting is a variant of &#8220;Free Stuff.&#8221; The attacker hopes to trick their victims into executing code by piquing their <strong>curiosity<\/strong> or convincing them to <strong>run hardware or software with hidden malware<\/strong>. For example, innocent-looking <strong>USB sticks<\/strong> handed out at a conference or casually &#8220;dropped&#8221; in the parking could contain malware. They then detonate when the curious user plugs it into their PC. This is how <a href=\"https:\/\/spectrum.ieee.org\/telecom\/security\/the-real-story-of-stuxnet\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Stuxnet<\/a> attacked the Iranian nuclear program.<\/p>\n<h3>Quid pro quo social engineering classic<\/h3>\n<p><a href=\"https:\/\/scvnews.com\/con-man-among-us-commentary-by-dianne-erskine-hellrigel\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115509\" title=\"Seven Social Engineering Classics\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/man_scam-artist.jpg?resize=90%2C84&#038;ssl=1\" alt=\"Seven Social Engineering Classics\" width=\"90\" height=\"84\" \/><\/a>Another version of &#8220;Free Stuff.&#8221; In Latin, Quid pro quo means &#8220;something for something.&#8221; In exchange, the attacker offers something of genuine worth to the victim and will work their way into the target&#8217;s network. An example: The attacker poses as <a href=\"https:\/\/www.fastcompany.com\/90341507\/tech-support-scams-stealing-millions-from-the-elderly\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tech support<\/a> and solves a problem for you, then convinces you to type in a line of code that serves as a &#8220;backdoor.&#8221; On the other hand, it may be as simple as trading a <a href=\"https:\/\/www.sciencedaily.com\/releases\/2016\/05\/160512085123.htm\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">candy bar<\/a> in exchange for a password!<\/p>\n<h3>Waterholing<\/h3>\n<p>This attack plants malware on a website you and your colleagues frequently visit. The next time you surf the site, the malware\u2014such as a <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/RAT-remote-access-Trojan#:~:text=A%20remote%20access%20Trojan%20(RAT,sent%20as%20an%20email%20attachment.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">remote-access <\/a>Trojan or\u00a0RAT\u2014is downloaded to your computer. And just like that, the attacker can begin exfiltrating data from your employer&#8217;s network.<\/p>\n<h3>Pretexting<\/h3>\n<p>Pretexting is another form of social engineering in which attackers focus on creating a fabricated scenario that they can use to try to steal their information. It is a<strong> true con game. <\/strong>It\u00a0relies on the crook fostering a <strong>sense of trust<\/strong> in the victim.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-115521\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hacker-e1601742109523-122x150.png?resize=73%2C90&#038;ssl=1\" alt=\"Pretexting\" width=\"73\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hacker-e1601742109523.png?resize=122%2C150&amp;ssl=1 122w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hacker-e1601742109523.png?resize=61%2C75&amp;ssl=1 61w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/woman_hacker-e1601742109523.png?w=185&amp;ssl=1 185w\" sizes=\"auto, (max-width: 73px) 100vw, 73px\" \/><\/p>\n<p id=\"3d0d\" class=\"gb gc cr gd b ge gf gg gh gi gj gk gl gm gn go gp gq gr gs gt gu gv gw gx gy cj dj\" data-selectable-paragraph=\"\">Pretexting can also impersonate co-workers, police, banks, or tax authorities. It pretends to be any individual who could have perceived authority or right-to-know in the targeted victim&#8217;s mind. In some cases, all that is needed is an authoritative voice, an earnest tone, and an ability to think on one&#8217;s feet to create a pretext scenario.<\/p>\n<p style=\"text-align: center;\"><em><strong><a href=\"https:\/\/covid.cdc.gov\/covid-data-tracker\/?utm_source=morning_brew#cases_casesper100klast7days\" target=\"_blank\" rel=\"noopener noreferrer\">Stay safe out there!<\/a><\/strong><\/em><\/p>\n<p><strong>Related article<\/strong><\/p>\n<ul>\n<li><a title=\"Why the $26 billion in BEC scams are worse than you think\" href=\"https:\/\/web.archive.org\/web\/20210622110524\/https:\/\/www.scmagazine.com\/perspectives\/why-26-billion-in-bec-scams-are-worse-than-you-think\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Why the $26 billion in BEC scams are worse than you think<\/a>\u00a0(<a title=\"SC Media\" href=\"https:\/\/www.scmagazine.com\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SC Media<\/a>)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat <a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering attacks take advantage of human nature to manipulate you into bypassing security or business rules to do something you normally wouldn&#8217;t<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3397,3508,23,612,1190,1507,3506,4,2481,63,3507],"class_list":["post-82602","post","type-post","status-publish","format-standard","hentry","category-security","tag-3397","tag-bec","tag-malware","tag-phishing","tag-pizza","tag-ransomware","tag-rat","tag-security","tag-social-engineering","tag-usb","tag-voice-mail"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=82602"}],"version-history":[{"count":26,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82602\/revisions"}],"predecessor-version":[{"id":119918,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/82602\/revisions\/119918"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=82602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=82602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=82602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}