Social Engineering Techniques
Phishing: mass-targeted deceptive emails impersonating legitimate organizations (banks, Microsoft, IT helpdesk) to steal credentials or install malware. Users click malicious links or attachments. Spear phishing: targeted phishing customized for a specific individual using personal information — much higher success rate. Whaling: spear phishing targeting senior executives. Vishing: voice phishing over telephone. Smishing: SMS text message phishing.
Pretexting: creating a fabricated scenario (pretext) to gain trust and extract information. 'I'm from IT and need your password to fix an urgent issue.' 'I'm the auditor and need access to the server room.' Attackers research targets to make the pretext convincing.
Baiting: leaving infected USB drives in public locations (parking lots, reception areas) hoping employees will plug them in out of curiosity. Infected drives auto-run malware when connected.
Tailgating / piggybacking: physically following an authorized person into a secured area. Quid pro quo: offering something in exchange for information — 'I'll fix your computer problem if you give me your login credentials.' Dumpster diving: searching through trash for sensitive information (documents, hardware, credentials written on paper).
Psychological Principles Used
Attackers exploit cognitive biases: Authority (impersonating executives or IT staff), Urgency (creating time pressure — 'your account will be closed in 1 hour'), Scarcity (limited offers), Social proof (everyone else is doing it), Likability (building rapport), Reciprocity (doing a small favor to get a large one back), Fear (threatening negative consequences).
Countermeasures: security awareness training (the most effective defense), verification procedures (always call back using a number from the official directory, not one provided by the caller), clear policies (IT will never ask for your password), multi-factor authentication (stolen password alone is not enough), incident reporting procedures.