Despite the name, Social Engineering is not a way to gain followers on your social media accounts. On the contrary, the phenomenon is a cybersecurity attack that relies heavily on manipulating human behavior to disclose sensitive data. Desired data often includes credentials, granting access to personal devices, obtaining passwords, and bank information.
There are several methods of social engineering, and you will recognize many examples in your own email account. For the purposes of this blog, let's focus on and explain the most common ones for small businesses. The prominent social engineering campaigns aimed at businesses are:
When it comes to Business Email Compromise, the hacker impersonates a decision maker, vendor, or customer via email and requests subordinates perform transactions such as outgoing wire transfers, change payment details, and bank information. Unlike other forms of social engineering, BEC does not use malicious links or malware, instead, they rely on human error. The latter is significantly harder to manage and avoid.
Whaling relies on personal communication to gain access to a device. The difference is that whaling attacks tend to be personalized and target one person, typically a high-level executive. A whaling attack requires a substantial amount of research on the targeted individual. These types of attacks normally result in large payoffs.
This is the most common type of social engineering. Hackers leverage email, telephone, texts, and social media to entice users to click on a malicious link. Once done, the link downloads infected files or reveals personal information such as passwords and account numbers. Alternatively, the device is normally rendered unusable and will only be returned to “normal” once payment is made via cryptocurrency.
You may think you or your employees will not fall victim to such attacks. Our experience has shown otherwise. Now that you understand what Social Engineering is, watch for Part Two of this blog series which will cover what you can do to protect yourself along with processes and procedures we have found useful. Check out BudgetEase’s Protocol on Vendor Changes to incorporate policies in your organization to protect yourself from the consequences of Social Engineering.
(Be sure to read Part 2 of this series- "What You Can Do to Avoid Being a Victim of Social Engineering")