1.1 Social Engineering

Phishing and Other Types of Social Engineering

Phishing is one of the most common and well-known types of social engineering attacks, but there are several other social engineering techniques that attackers use to manipulate individuals and organizations.

Phishing = social engineering with a touch of spoofing | collect access credentials

Typosquatting = type of URL hijacking - https://professormessor.com - https://pprofessormessorr.com Pretexting = lying to get information | attacker is the character in a situation they create

Pharming = redirecting a legit website to a fake site | harvest large groups of people's information - poisoned DNS server or client vulnerabilities - difficult for anti-malware software to stop | everything appears legitimate to the user

Vishing = phishing over the phone or voicemail - caller ID spoofing is common

Smishing = SMS phishing done by text message - forwards link or asks for personal information

Spear Phishing = targeted phishing | very directed attacks to a specific person or group of people

Whaling = targeted phishing with the possibility of a large catch | phishing a CEO or Department Manager | attack the ones who have the power or money, e.g. executives


Impersonation = attackers pretend to be someone they aren't | attack someone higher in rank | throw tons of technical details around to confuse the victim

Eliciting information = extracting information from the victim | commonly done with vishing - the victim is not even aware of this attack

Identity fraud = your identity can be used by others | credit card fraud | bank fraud | loan fraud


Dumpster diving = mobile garbage bin | simply searching for important information in a trash bin


Shoulder surfing = simply someone, attacker, looks over your sholder and see your password or other sensitive information - be aware of your surrounding - use privacy filters | keep your monitor out of sight


Computer hoaxes = a threat that doesn't actually exist but they seem like they could be real


Watering hole attack = attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit instead of primarily targeting your secure company, attackers target third party applications to find vulnerabilities - determine which website the victim group uses - use defense-in-depth | layered defense | firewalls and IPS | anti-virus


Spam = unsolicited messages, email, forums - commercial advertising - phishing attempts - Mail Gateways = stop unsolicited email at the gateway before it reaches the user - Tarpitting = intentionally slow down the server conversation (mail server)


Hacking public opinion = influence campaigns (influence public opinion on political and social issues) | nation-state actors (divide, distract, and persuade) - create fake users and fake content | post on social media | amplify messages | real users start to share the message | now mass media picks up the fake story - cyberwarfare = destabilization or destruction of critical systems. The objective is to weaken the target country by compromising its core systems


Tailgating = use an authorized person to gain unauthorized access to a building, simply follow them

Invoice scams = starts with a bit of spear phishing | attacker knows who pays the bills - attacker sends a fake invoice

Credential harvesting = attackers collect login credentials

Last updated

Was this helpful?