Occurs when a cyber criminal creates a social situation which can lead to a victim dropping their guard. Involves the manipulation of people into breaking their normal security procedures
No hacking necessary as the victim willingly gives the criminal the necessary information or access to carry out an attack
Instant Messaging: Malicious links embedded into instant messages, e.g an important software upgrade (relies on curiosity)
Scareware: Pop-up messages claiming a user’s computer has been infected by a virus; the user is told to download the fake anti-virus software (relies on fear)
Email/Phishing scams: User is tricked into opening links by legitimate looking emails (relies on trust)
Baiting: Cybercriminal leaves an infectedmemory stick somewhere that the target can pick it up and plug it in to see who it belongs to, unwittingly downloading malware (relies on curiosity)
Phone Calls: For example, a so called IT expert calls a user, claiming a device has been compromised and that they need to download software which allows the cybercriminal to take over the device. (Relies on fear)
Social engineering exploits either fear, curiosity or empathy/trust