With ever-increasing cybersecurity threats, it's important to stay on top of what the different attacks are and how you can avoid them. There are many different tactics that cyber attackers utilize, but one of the most common attacks is social engineering. This blog will focus on what the different types of social engineering attacks are, so that you can avoid being a victim. We will also discuss some things you can do if you think you are a victim of any of these attacks.
In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he or she may be able to piece together enough information to infiltrate an organization’s network. If an attacker is not able to gather enough information from one source, he or she may contact another source within the same organization and rely on the information from the first source to add to his or her credibility. There are several different types of social engineering attacks, but a phishing attack is by far the most common.
Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts.
Phishing attacks may also appear to come from other types of organizations, such as charities. Attackers often take advantage of current events and certain times of the year, such as
A very good example of this would be during and after the COVID-19 pandemic. Due to stay-at-home orders and a massive surge of working from home, phishing attempts increased dramatically and have continually become more sophisticated.
There are several different types of phishing attacks, such as vishing and smishing attacks. There are more details on these below.
Vishing is the social engineering approach that leverages voice communication. This technique can be combined with other forms of social engineering that entice a victim to call a certain number and divulge sensitive information. Advanced vishing attacks can take place completely over voice communications by exploiting Voice over Internet Protocol (VoIP) solutions and broadcasting services. VoIP easily allows caller identity (ID) to be spoofed, which can take advantage of the public’s misplaced trust in the security of phone services, especially landline services. Landline communication cannot be intercepted without physical access to the line; however, this trait is not beneficial when communication directly with a malicious actor.
Smishing is a form of social engineering that exploits SMS, or text, messages. Text messages can contain links to such things as webpages, email addresses or phone numbers that when clicked may automatically open a browser window or email message or dial a number. This integration of email, voice, text message, and web browser functionality increases the likelihood that users will fall victim to engineered malicious activity.
It's important to understand the tactics that social engineering attacks utilize in order to avoid them. It's very likely that you or someone you know has been targeting by one or more phishing or social engineering attempts. Without the knowledge of what phishing is, people are likely to fall for the tactic and provide sensitive information, click the malicious link, or download the malware.
The Cybersecurity and Infrastructure Security Agency (CISA) had done a phishing assessment campaign where they sent phishing emails to organizations and individuals as an experiment. Some of the results were reviewed in this infographic that was posted in 2023. They found that 80% of organizations had at least one individual fall victim to the attempt, and 10% of the phishing emails sent had someone execute malicious software embedded in the email by either a link or attachment. It was noted that only 13% of employees reported a phishing attempt.
This experiment shows how easily someone with malicious intent may be able to "trick" people into sending them sensitive information, payments, or more, and that's why it's important to be continually reminded and educated on phishing and other social engineering attacks so you can identify, avoid, and report them.
With phishing and social engineering occurring more often, it's important to be able to identify, avoid, and report the attempts to your organization, friends, and family. There are many different ways to avoid phishing, below is a list of steps you can do to be sure you stay safe:
If you think you fell for a phishing scam or other social engineering attack, don't panic there are steps you can take to keep yourself secure. Often, the reason that phishing attacks are performed is to gather some form of information. Maybe it's account information, a name or address, or even credit card information. The attacker uses this information to either get further into your organization, make purchases, or use your identity. Below is a list of steps you should take if you believe you've fallen for a phishing scam or social engineering attack:
Phishing and social engineering attempts are the first steps for larger cyber attacks or data breaches. Although they have proven to be successful and many people do fall victim to them, they aren't impossible to avoid. With the proper education, training, and mindset, phishing and social engineering can be prevented. If you want to learn more on how you or your organization can learn more about phishing and how you can train yourself or coworkers, click the button below:
Reference: Cybersecurity and Infrastructure Security Agency (CISA)
To learn some more ways to prevent social engineering see:
Defending Against COVID-19 Cyber Scams | Don't Fall for Another Phishing Email | Is Your MFP Protected from Security Threats | |
What is Ransomware and How to Protect Yourself | Working Securely from Home |