Welcome to the KYC Cleared blog. We share tips on personal data privacy online, KYC trends and how-tos, and more on compliance with KYC/KYB regulations and data protection.

Understanding Social Engineering

Published October 21, 2024 at 6:51 PM

When you think about cyber threats, hackers behind screens often come to mind. However, many successful attacks rely on manipulating human behaviour rather than technology. This is known as social engineering, where cybercriminals use deception to trick people into divulging confidential information or performing actions that compromise security.

What Is Social Engineering?

Social engineering is the practice of tricking individuals into revealing sensitive information or granting access to systems. Instead of hacking security systems, cybercriminals rely on human trust, fear, and manipulation to achieve their goals. These attacks can happen to anyone—businesses, employees, or everyday consumers—and are often difficult to detect.

Most Common Types of Social Engineering Attacks

Phishing

Phishing involves sending fraudulent emails that appear to be from trusted organisations or individuals to trick recipients into revealing personal information like passwords or credit card numbers.

Tip

Learn how to spot phishing emails by checking for tell-tale signs like poor grammar, unfamiliar senders, or urgent requests.

Spear Phishing

Unlike general phishing, spear phishing is more targeted, customised to a specific individual or company. The attacker pretends to be someone the recipient knows or trusts, making it even harder to detect.

Example: An attacker may impersonate a senior executive to request sensitive company information from an employee.

Baiting

In baiting, attackers offer something enticing, like free software or a "confidential" file, to trick individuals into clicking on a malicious link or downloading malware.

Pretexting

Pretexting involves creating a fake scenario to gain access to personal information.

Example: An attacker might call an employee pretending to be from IT, asking for login details to fix a system "issue."

Tailgating (Piggybacking)

This is a physical form of social engineering, where attackers gain access to secure areas by following authorised personnel, often pretending they’ve forgotten their access card.

Know the Threats Lurking in Everyday Interactions

Social engineering attacks take advantage of human behaviour, making them difficult to spot but incredibly effective. By understanding the most common types of social engineering—like phishing, baiting, and pretexting—you can better protect yourself and your organisation.