Common social engineering attack methods
Understanding the many assault vectors for this sort of criminal activity is essential for its prevention. The following subsections provide insight into how cybercriminals operate.
Pretexting
To improve the likelihood that a prospective victim will bite, an imagined scenario is employed to interest the victim.
It is a bogus purpose that often involves some actual knowledge about the victim (e.g., date of birth or social security number) in an effort to get further information.
Let’s have an example: Imagine that Mr. White is a middle manager of a company and goes to the same bar every morning to have an expresso coffee before going to work. Let’s suppose that I am a Social Engineer who wants to hack that company. I’ll go to the same place at the same time everyday. After a couple of weeks, I’ll wish him good morning before leaving, and he will answer politely. Within a few months, I’ll be able...