Social Engineering Techniques - The Human Factor Approach

By Lanre Yusuf   |   Sep 15 2022

Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cybersecurity experts use the term “social engineering” to highlight the “human factor” in digitized systems, as social engineering attacks aimed at manipulating people to reveal sensitive information.

Let’s dig a little deeper into understanding what Social Engineering entails. Social engineering is one of the few types of attacks that can be classified as non-technical attacks in information security, but at the same time, it can combine with technical types of attacks like spyware and Trojan more effectively. It is the most common way of committing cybercrimes through the intrusion and infection of computer systems and information technology. It can be referred to as a set of attack strategies poised at manipulating people to reveal sensitive information. The most known perhaps are phishing attacks, which are when unsuspecting users are asked to click on a faulty link and, by doing so, enable hackers to install malware and enter the system. In all cases, social engineering attacks involve a combination of social interactions and technological exploits, leaving cybersecurity professionals in companies and government organizations alike struggling to develop effective countermeasures.

There are two categories of social engineering under which all social engineering attempts could be classified:

  1. Computer or Technology based deception: The Technology-based approach is to deceive the user into believing that he is interacting with the real computer system and get him to provide confidential information.
  2. Human-based deception: This is done through deception, by taking advantage of the victim’s ignorance, and the natural human inclination to be helpful and liked.

The Human base deception thrives more because human beings can be very easily manipulated into providing information or other details that may be useful to an attacker. “Malicious social engineers aren’t necessarily very technical people but they’re crafty and clever in the way they think,” says the chief operating officer of Social Engineer.

Several high-profile cases of social engineering attacks have recently caught the attention of both IT security experts and political commentators. For instance, in 2020 and 2021, hackers targeted the social media platform Twitter, including the accounts of celebrities such as Bill Gates, Elon Musk, and Kanye West as well as the public profiles of former US President Barack Obama and then-Democratic nominee Joe Biden. The hackers used their temporary access to solicit cryptocurrency payments from the hacked accounts’ followers. Despite the relatively small financial damage and an inconsequential dent in Twitter’s reputation, this incident revealed the widespread potential for social engineering attacks, as the hackers used the company’s customer support to gain access to those accounts—not a technical backdoor in the web service’s software. In reports about the incident from an internal investigation, Twitter explains that it was not the network that the hackers targeted but that they “misled certain employees” and “exploited human vulnerabilities” (Twitter 2020).

Social engineering attacks highly depend upon human errors, so preventing security breaches from such attacks is notoriously difficult. Social engineering attacks are extremely hard and sophisticated to detect even with the most advanced security tools. At Techspecialist Consulting Limited, our advice to our clients on the primary measure to defend against the social engineering attack is to focus on Employee Education as well as Training and Awareness (ETA) programs for individuals on technology implementation. For us, Education, Training, and Awareness (ETA) is the primary measure to prevent social engineering attacks because it helps to improve:

  • the safe handling behavior of information,
  • identify the potential attacks,
  • develop the confidence to handle during the attacks,
  • And helps prepare the team to fight any social attacks

We help train your team on how to identify potential targets within the organization, learn the techniques used by attackers to contact their targets, and how manipulation takes place via targeted communication and “cold reading”.

Reach out to us today via our email: info@techspecialistlimited.com or phone number: 09 2911443

Hope you enjoyed reading this post. Share with your friends.

Contact Me

Phone

Our Contact Info

You can contact us directly or visit our office from Monday to Friday

Office

Goldlink House, 2 Harare Steet, Off Rabat Street, Zone 6, Wuse, Abuja.

Visiting Hours

8AM - 5PM

Mail

info@techspecialistlimited.com

Phone

092911443