Social Engineering: The People Hackers
Student Blog: Yusra Nadeem
January 15, 2020

Social engineering uses a human’s helpful nature against them to access personal data and gain entry into secure systems, such as bank accounts. Social engineering can take many forms, from an urgent company email to a convincing phone call. Social engineers use these tactics for malicious purposes and gain confidential information such as social security numbers, usernames, passwords, and more. Presently, only 3% of malware is technical in nature, while 97% of attacks utilize social engineering to reach their targets.
Social Engineering and its Many Forms
There are many different types of social engineering; in-person, phone, or digital.The second type of social engineering is over the phone. This tactic focuses on manipulating your emotions in an attempt to gain access to your accounts, devices, or information. An approximated 4.6 million phone attacks occurred in 2013 using multiple techniques, such as an attacker posing as a customer support agent and convincing the target to give up their passwords. Social engineers also use intimidation tactics to bully callers into revealing confidential information. Another strategy attackers use is asking for donations for a known organization; when the donator gives the payment information, the attacker steals the payment information for their own use.
Lastly there’s digital social engineering which is done via email, websites, and social media. Phishing attacks are the most common, as they make up 77% of digital attacks. Phishing itself can take many forms, but a popular one is when a social engineer sets up a fake website to mimic a known brand and seeks to trick users into using that website instead of the real one. From here, the attacker can attain user credentials or further compromise the user by making them download malware. The same process can apply to social media accounts. Typosquatting is another method of social engineering that relies on user typos. The attacker purchases a domain name similar to that of a popular service, but with common misspellings or typos. The attacker then hopes someone will commit a typo and land on his website instead of the real one.