Cyber attacks take many forms but social engineering is a particularly pernicious tactic which can have serious implications for your IT security.
‘Social engineering’ is a blanket term that refers to the methods malicious attackers use to manipulate people into revealing or providing confidential information. The methods of communicating the request may be in person, over the phone or a video call, or via written communication such as email.
When the method used is email, this is most commonly referred to as phishing. Here the social engineer attempts to get some form of personal information from the target, usually credit card information or login details to a site or service that the target has access to. Commonly this will take the form of an email that appears to originate from a bank or online service (such as Office 365), and will look legitimate at first glance.
This email will use one or more of the principles listed below to get the target to click on a link in the email and enter their login credentials to what appears to be the correct online portal. However, this will be a fake login page that will harvest the targets credentials for later use by the attacker.
A more specialised form of phishing is spear phishing, which targets specific individuals as opposed to the more blanket emails generally sent. These are a lot more difficult to detect, as they are specifically crafted to target the individuals.
Other forms of social engineering emails include requests for payment or bank transfers to legitimate recipients, but with bank details belonging to the attacker.
Social engineers rely on a few key principles to manipulate people into giving up the information they are after. These are:
The possible ways to spot potential attempts vary depending on the method employed by the social engineer. The primary defence against any form of social engineering is user ongoing awareness training. Educating your users about the dangers of social engineering and the ways to detect and stop these attempts is the single most effective defence.
For phone calls, one of the most effective defences is having a documented process for verifying a caller’s identity for any requests involving sensitive information (you do have an information classification policy in your organisation, don’t you?). Simply insisting on calling back the caller on a number you already have for them, if it is supposedly someone you know, will prove the caller legitimate or not. If the caller is not someone you presently know, asking for a contact number to call them back on will often dissuade all but the most confident social engineer.
For phishing emails, there are a few things to check carefully, especially those asking for sensitive information:
Should you fall victim to a phishing email and enter your credentials into a fake login site, always contact your IT support company straight away to get your password reset.
If you have any questions about the information security of your business, do get in touch with one of the experts at the Conosco Security Division: securitydivision@conosco.com