Social Engineering
Social Engineering
Social Engineering
Social Engineering
1. Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s greed or
curiosity. They lure users into a trap that steals their personal information or inflicts their
systems with malware. The most reviled form of baiting uses physical media to disperse
malware.
Baiting scams don’t necessarily have to be carried out in the physical world. Online forms of
baiting consist of enticing ads that lead to malicious sites or that encourage users to
download a malware-infected application.
Scareware is also distributed via spam email that doles out bogus warnings, or
makes offers for users to buy worthless/harmful services.
3. Pretexting
Here an attacker obtains information through a series of cleverly crafted lies. The
scam is often initiated by a perpetrator pretending to need sensitive information
from a victim so as to perform a critical task.
The attacker usually starts by establishing trust with their victim by impersonating
co-workers, police, bank and tax officials, or other persons who have right-to-
know authority. The pretexter asks questions that are ostensibly required to
confirm the victim’s identity, through which they gather important personal data.
All sorts of pertinent information and records is gathered using this scam, such as
social security numbers, personal addresses and phone numbers, phone records,
staff vacation dates, bank records and even security information related to a
physical plant.
Actual link:
Forged link:
• Be wary of tempting offers: For example messages/emails like 99% discount on Amazon click
to avail the offer.
To avoid such offers instead of clicking on the link try to search on the authentic website/app.