Social engineering is a term used for a variety of malicious activities designed to help a fraudster gain access to confidential information in hopes of financial gain. Social engineering occurs in a variety of forms, many of which are listed below.
It is important to remember that Social Engineers feed off the goodness of people by tricking them into wanting to help.
Baiting is a form of social engineering where a fraudster uses a false promise to entice their victim into a situation which compromises their personal and/or financial information or allows entry into their “system” to infect with malware.
Common examples of baiting are pop-up windows on computers advising:
Phishing is when fraudsters attempt to obtain confidential information from their victims via email. Phishing attempts may appear to be emails from people you know such as family, friends, colleagues, or organizations in which you conduct business or social activities with. “Spear Phishing” is when fraudsters target a specific person within an organization who could have access to valuable information, such as bank accounts.
Common examples of Phishing:
Smishing is the text message version of phishing. These text messages often contain a web link or telephone number requesting immediate attention. The web link typically contains malware, also referred to as malicious software, that downloads to your device to gain access to your private and confidential information. If the victim calls the phone number listed in the smishing text, the victim is prompted to give confidential information to “resolve” the issue.
Common examples of Smishing:
It is important to remember unexpected text messages containing links and call to action requests are typically scams. Do not engage. If you have questions and/or concerns, contact the business directly using publicly available contact information.
Vishing is voice phishing and completed via phone. These calls are centered around gaining access to financial information and may even include spoofed phone numbers. Spoofed phone numbers may appear to be from the local community or even the actual financial institution.
Common examples of Vishing:
Review the tips below to prevent becoming a victim of a Social Engineering attack.