T 5.42 Social Engineering

Social engineering is a method used to gain unauthorised access to information or IT systems by "listening in". Social engineering exploits human characteristics such as the willingness to help others, trust, fear, or respect for authority. Employees can be manipulated using social engineering so that they perform unauthorised tasks. A typical case of attacks carried out with the help of social engineering includes the manipulation of employees by calling them on the telephone and masquerading as one of the following persons, for example:

If asked critical questions, the inquisitive caller may say that he/she is somebody "important" or "just an assistant".

Another strategy used in systematic social engineering is to build a long-term relationship with the victim. By making numerous trivial telephone calls in advance, the attacker is able to collect information and build trust, which he/she can then exploit later.

Such attacks can also be conducted in several stages by using the knowledge and techniques gained in the previous stages.

Example:

Many users know that they are not allowed to give their passwords to anyone else. Social engineers are aware of this and therefore need to find other ways to reach their goals. Examples of this include:

When conducting a social engineering attack, the attacker will not always be visible because there are also other versions of this type of attack where the attacker remains in the background. In many cases, the victims never even find out that they have been exploited. If this is the case, the attacker does not even have to worry about criminal prosecution and also has a source for obtaining additional information later.

The use of email and internet services offers numerous ways of obtaining information under false pretences. Once the trust of the victim is gained, it is easy for the attacker to provide the victim with an email containing an attached Trojan horse, for example. Since the victim knows the attacker and considers him/her to be trustworthy, the email and the attachment are also considered trustworthy and are then opened.

Social networks

Social networks on the internet offer a good basis for social engineering. These platforms can be used in order to obtain numerous background information about persons. The information people disclose by means of their profile may be collected and used as a basis for obtaining further information.