Social Engineering (original) (raw)

What is social engineering?

Social engineering attacks manipulate people into sharing information that they shouldn’t share, downloading software that they shouldn’t download, visiting websites they shouldn’t visit, sending money to criminals or making other mistakes that compromise their personal or organizational security.

An email that seems to be from a trusted coworker requesting sensitive information, a threatening voicemail claiming to be from the IRS and an offer of riches from a foreign potentate are just a few examples of social engineering. Because social engineering uses psychological manipulation and exploits human error or weakness rather than technical or digital system vulnerabilities, it is sometimes called "human hacking".

Cybercriminals frequently use social engineering tactics to obtain personal data or financial information, including login credentials, credit card numbers, bank account numbers and Social Security numbers. They use the stolen information for identity theft, enabling them to make purchases using other peoples’ money or credit, apply for loans in someone else’s name, apply for other peoples’ unemployment benefits and more.

But a social engineering attack can also be the first stage of a larger-scale cyberattack. For example, a cybercriminal might trick a victim into sharing a username and password and then use those credentials to plant ransomware on the victim’s employer’s network.

Social engineering is attractive to cybercriminals because it enables them to access digital networks, devices and accounts without having to do the difficult technical work of getting around firewalls, antivirus software and other cybersecurity controls.

This is one reason why social engineering is the leading cause of network compromise today according to ISACAs State of Cybersecurity 2022 report. According to IBM's Cost of a Data Breach report, breaches caused by social engineering tactics (such as phishing and business email compromise) were among the most costly.

The latest tech news, backed by expert insights

Stay up to date on the most important—and intriguing—industry trends on AI, automation, data and beyond with the Think newsletter. See the IBM Privacy Statement.

Thank you! You are subscribed.

How and why social engineering works

Social engineering tactics and techniques are grounded in the science of human motivation. They manipulate victims’ emotions and instincts in ways proven to drive people to take actions that are not in their best interests.

Most social engineering attacks employ one or more of the following tactics:

Types of social engineering attacks

Phishing

Phishing attacks are digital or voice messages that try to manipulate recipients into sharing sensitive information, downloading malicious software, transferring money or assets to the wrong people or taking some other damaging actions. Scammers craft phishing messages to look or sound like they come from a trusted or credible organization or individual, sometimes, even an individual the recipient knows personally.

There are many types of phishing scams:

According to the IBM® X-Force® Threat Intelligence Index, phishing is the leading malware infection vector, identified in 41% of all incidents. According to the Cost of a Data Breach report, phishing is the initial attack vector leading to the most costly data breaches.

Baiting

Baiting lures (no pun intended) victims into knowingly or unwittingly giving up sensitive information or downloading malicious code by tempting them with a valuable offer or even a valuable object.

The Nigerian Prince scam is probably the best-known example of this social engineering technique. More current examples include free but malware-infected games, music or software downloads. But some forms of baiting are barely artful. For example, some threat actors leave malware-infected USB drives where people will find them, grab them and use them because "hey, free USB drive".

Tailgating

In tailgating, also called "piggybacking", an unauthorized person closely follows an authorized person into an area containing sensitive information or valuable assets. Tailgating can be conducted in person, for example, a threat actor can follow an employee through an unlocked door. But tailgating can also be a digital tactic, such as when a person leaves a computer unattended while still logged in to a private account or network.

Pretexting

In pretexting, the threat actor creates a fake situation for the victim, and poses as the right person to resolve it. Very often (and most ironically) the scammer claims that the victim has been impacted by a security breach, and then offers to fix things if the victim will provide important account information or control over the victim’s computer or device. Technically speaking, almost every social engineering attack involves some degree of pretexting.

Quid pro quo

In a quid pro quo scam, hackers dangle a desirable good or service in exchange for the victim’s sensitive information. Fake contest winnings or seemingly innocent loyalty rewards ("thank you for your payment, we have a gift for you") are examples of quid pro quo ploys.

Scareware

Also considered a form of malware, scareware is software that uses fear to manipulate people into sharing confidential information or downloading malware. Scareware often takes the form of a fake law enforcement notice accusing the user of a crime, or a fake tech support message warning the user of malware on their device.

Watering hole attack

From the phrase "somebody poisoned the watering hole", hackers inject malicious code into a legitimate web page that is frequented by their targets. Watering hole attacks are responsible for everything, from stolen credentials to unwitting drive-by ransomware downloads.

Social engineering defenses

Social engineering attacks are notoriously difficult to prevent because they rely on human psychology rather than technological pathways. The attack surface is also significant: In a larger organization, it takes just one employee's mistake to compromise the integrity of the entire enterprise network. Some of the steps that experts recommend to mitigate the risk and success of social engineering scams include: