Types of Social Engineering

Discuss smarter ways to manage and optimize cv data.
Post Reply
sohanuzzaman54
Posts: 124
Joined: Mon Dec 23, 2024 4:26 am

Types of Social Engineering

Post by sohanuzzaman54 »

Social engineering that has been done or has occurred is called a social engineering attack that can occur in various ways. At least, there are 7 types of social engineering attacks that need to be watched out for, namely:

Baiting
As the name suggests, baiting is a type of social engineering attack that uses bait. This type of attack is the most common.

For example, when you want to download a free list of kazakhstan cell phone numbers song on a website , you should be alert if you are directed to allow any access from the website to your device .


Pretexting
Pretexting is a technique used by criminals ( hackers ) to manipulate someone, so that the hacker can get the desired information or access by creating a fake scenario.

What often happens is that the fraudster will disguise himself as a colleague or someone with special authority who needs data. What needs to be watched out for is that hackers have the ability to interact persuasively, so that the target can do what the fraudster wants without suspicion.


Phishing
Phishing is a way to trick someone into getting information. Phishing targets are generally personal data, account data, and financial data.

Usually, criminals will send fake emails, by appearing to be an authorized party or agency. So, the recipient of the email feels confident and is willing to follow the instructions of the fake email.

Phishing emails generally direct recipients to provide important data, click on links to malicious sites, or open attachments containing malware .


Image source: dummies.com

Spear Phishing
Spear phishing is a type of social engineering where the phishing attack has a specific target. So, hackers need to have basic information from the target; such as name, position in the company, email, and so on.

In this way, hackers are able to build trust in the target and also find weak points before taking action to steal or sabotage data.


Quid Pro Quo
Quid Pro Quo is a way of obtaining confidential information by offering a number of benefits in the form of services.

This type of social engineering attack is considered a low-level hack. Usually, hackers will contact victims by impersonating an authority figure and also offering assistance.


Image source: twitter.com

Tailgating
Tailgating , also known as piggybacking, is a type of physical social engineering in which a fraudster manipulates an authorized person to access a location that requires authentication.

Companies with multiple access points can be targets for social engineering tailgating . For example, someone posing as a delivery driver or online motorcycle taxi driver can enter the parking lot or even the entrance to the company building.
Post Reply