{"id":10885,"date":"2022-10-04T13:47:19","date_gmt":"2022-10-04T13:47:19","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=10885"},"modified":"2022-11-16T20:46:52","modified_gmt":"2022-11-16T20:46:52","slug":"most-common-types-social-engineering","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/most-common-types-social-engineering\/","title":{"rendered":"Most Common Types of Social Engineering Attacks"},"content":{"rendered":"<p style=\"text-align: justify\">Intruders are developing more and more methods to get what they want. <strong>Social engineering<\/strong> is one of the most common methods through which fraudsters manage to deceive the user, manipulate him, and instill his fear and urgency. Once the victim is emotional, the fraudsters begin to cloud her judgment. Any human error is a vulnerability that makes social engineering work. This article will present the <strong>top most common types<\/strong> of social engineering. Along with it, you\u2019ll see the guidance on how to avoid becoming a victim of such attacks.<\/p>\n<h3>1. <a href=\"https:\/\/gridinsoft.com\/blogs\/phishing-most-common-cyberattack\/\">Phishing attacks<\/a><\/h3>\n<p style=\"text-align: justify\">According to FBI statistics, <strong><a href=\"https:\/\/gridinsoft.com\/blogs\/top-12-types-of-phishing-attacks-facts-you-should-to-know\/\">phishing is the most common form<\/a><\/strong> of social engineering. This is when fraudsters use any form of communication, usually email, to get personal information. Phishing typically exploits the trust of companies\u2019 employees or family members. These attacks are ten times more successful than any other form of social engineering. The fraudster may send you an email stating that it is from your bank \u2013 that\u2019s what is called banking phishing. Crooks claim that your account password has been compromised, and requires that you immediately <strong>click the link or scan the QR code<\/strong>. Then you enter your personal information, which is immediately passed on to the fraudster. If you doubt the legitimacy of the site,you can check whether the site is secure by checking that their URL uses HTTPS instead of HTTP.<\/p>\n<figure id=\"attachment_10671\" aria-describedby=\"caption-attachment-10671\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1-1024x634.png\" alt=\"What to Do if A Scammer Has Your Email Address?\" width=\"750\" height=\"464\" class=\"size-large wp-image-10671\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1-1024x634.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1-300x186.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1-768x475.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1-1536x951.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/09\/phishingexample1.png 1543w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-10671\" class=\"wp-caption-text\">At first glance, it may seem that this letter is from Apple, but the address is not actual.<\/figcaption><\/figure>\n<h3>2. Whaling<\/h3>\n<p style=\"text-align: justify\">The term whaling refers to an attack that targets a specific celebrity, executive, or government employee. Typically, these individuals are <a href=\"https:\/\/gridinsoft.com\/blogs\/recognize-and-avoid-phishing-scams\/\">targeted by a phishing scam<\/a>. When it comes to scams involving victims of <strong>whaling attacks, financial incentives<\/strong> or access to valuable data are typically big deals for criminals. They consider these victims of big fish &#8211; because of the large monetary and data payoff they offer &#8211; perfect targets.<\/p>\n<p style=\"text-align: justify\">Scammers seek compromising photos of celebrities they can use to extortionate high ransoms. <strong>Criminals use fake emails<\/strong> to fool senior employees into thinking they come from the organization. The messages detail information about a colleague and claim the creator is afraid to report the situation to a supervisor. They share their evidence as a spreadsheet, PDF, or slide deck.<\/p>\n<p style=\"text-align: justify\">Victims clicking the provided link are redirected to a malicious website that tells them to visit the link again. If they try to open the attached file, <a href=\"https:\/\/gridinsoft.com\/blogs\/benefits-of-using-malware-protection\/\">malware resides on their computer <\/a>and gains access to their network.<\/p>\n<h3>3. Smishing (SMS phishing) and vishing (voice phishing)<\/h3>\n<p style=\"text-align: justify\">Under this term, people refer to phishing <strong>via text messages<\/strong>. Crooks buy the branded number from a cellular operator and use it to send out messages containing malicious links.<\/p>\n<p style=\"text-align: justify\">Phone phishing is called vishing, and it&#8217;s the same as phishing done over the phone. <a href=\"https:\/\/gridinsoft.com\/blogs\/smishing-and-vishing-differences-you-need-to-know-about-these-phishing-attacks\/\">Vishing is a scam that affects<\/a> businesses more than any other type of organization. In this scam, an impostor will contact the front desk, human resources, IT or a company&#8217;s customer service. They will lie about needing personal information about an employee and claim to have information on mortgages or executive assistants.<\/p>\n<figure id=\"attachment_8516\" aria-describedby=\"caption-attachment-8516\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage-1021x1024.jpeg\" alt=\"Smishing And Vishing: Differences You Need To Know About These Phishing Attacks\" width=\"750\" height=\"752\" class=\"size-large wp-image-8516\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage-1021x1024.jpeg 1021w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage-300x300.jpeg 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage-150x150.jpeg 150w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage-768x770.jpeg 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/06\/triodoshippo_inlineImage.jpeg 1032w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-8516\" class=\"wp-caption-text\">An example of smishing<\/figcaption><\/figure>\n<h3>4. Baiting<\/h3>\n<p style=\"text-align: justify\">It\u2019s a kind of social engineering that\u2019s a lot like phishing. The only difference is that the attackers <strong>lure their victim with a product or an object<\/strong> during the attack. This happens as follows: the attacker offers the victim a free download of a popular movie or a new game. With such a disguise, the criminal installs malware into the victim&#8217;s system. Attackers can also use the opportunity <strong>to spread malware<\/strong> on the victim\u2019s device. If we talk about the physical distribution of malware, here, the crooks do it through a USB drive with a tempting label. After the curious employee sticks this USB into his device, he infects his PC or other devices.<\/p>\n<figure id=\"attachment_10905\" aria-describedby=\"caption-attachment-10905\" style=\"width: 592px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/image-1-1.png\" alt=\"\" width=\"592\" height=\"350\" class=\"size-full wp-image-10905\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/image-1-1.png 592w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/image-1-1-300x177.png 300w\" sizes=\"auto, (max-width: 592px) 100vw, 592px\" \/><figcaption id=\"caption-attachment-10905\" class=\"wp-caption-text\">Torrent trackers are one of the most often locations where baiting takes place<\/figcaption><\/figure>\n<h3>5. Pretexting<\/h3>\n<p style=\"text-align: justify\">Whenever someone creates a false ID or abuses their current position, this is closely related to the data leak from within. Because people trust their work, these scammers <strong>trick victims into sharing personal information<\/strong>. They build this trust by using titles and gaining access to victims through their legitimacy. Because of the victim\u2019s <a href=\"https:\/\/gridinsoft.com\/blogs\/pretexting-in-cybersecurity\/\">over-reliance on the authoritie<\/a>s, they are unlikely to question suspicious activities or put pressure on impostors.<\/p>\n<h3>6. Watering hole attacks<\/h3>\n<p style=\"text-align: justify\">This attack works <strong>by identifying the website<\/strong> the victim visits most. In this case, the victim may be not only a single user but an entire sector, such as government or health care, where the same sources of use are used during work. Here, <a href=\"https:\/\/nvd.nist.gov\/vuln\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">intruders seek vulnerabilities in cyber security<\/a>, through which they can infiltrate the system and distribute their malware. Although the case is small, the fraudsters continue to infect users&#8217; devices through already infected sites.<\/p>\n<h2>How to prevent Social Engineering Attacks<\/h2>\n<p style=\"text-align: justify\">The following tips will help you warn yourself against attacks. But this is only possible if you use it in practice.<\/p>\n<ul>\n<li>Carefully <strong>check emails<\/strong>, including names, addresses, and copy.\n<li><strong>Do not believe everything<\/strong> you see in the letter, especially if it causes you violent emotions.\n<li><strong>Verify<\/strong> the identity of the sender before providing him with any information.\n<li>Do not pay ransom to strangers. Instead, it is best to contact law enforcement.\n<li>Use the password manager.\n<li>Set <a href=\"https:\/\/gridinsoft.com\/mfa\">two-factor authentication<\/a>, which will double-check who is trying to log in to your account.\n<li>Install reliable <a href=\"https:\/\/gridinsoft.com\/antimalware\"><strong>GridinSoft Anti-Malware Protection<\/strong><\/a>, which will protect you from malware.\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Intruders are developing more and more methods to get what they want. Social engineering is one of the most common methods through which fraudsters manage to deceive the user, manipulate him, and instill his fear and urgency. Once the victim is emotional, the fraudsters begin to cloud her judgment. Any human error is a vulnerability [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":10908,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[17],"tags":[619,131,971,724],"class_list":{"0":"post-10885","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-labs","8":"tag-cybersecurity","9":"tag-phishing","10":"tag-pretexting","11":"tag-smishing"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2022\/10\/GS_Blog_banner_Most-Common-Types-of-Social-Engineering-Attacks_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=10885"}],"version-history":[{"count":17,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10885\/revisions"}],"predecessor-version":[{"id":11939,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/10885\/revisions\/11939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/10908"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=10885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=10885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=10885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}