There have been several cases of social engineering that have made headlines.

0
122

You’ll be better prepared in the future if you have this information at your disposal. If you’d want to learn more about how fraudsters use social engineering techniques, we’ll concentrate on three that have been proven effective by fraudsters regardless of technological platform. In case of any الابتزاز الإلكتروني, please visit our website.

Surprise your visitors with a delectable dish.

The simplest method to swindle a victim is to take advantage of their own greed, as every con artist will tell you. Nigerian 419 scammers have been defrauding naive victims of their money for years with the promise of a portion of the money they send. “Nigerian prince” emails have long been a popular prank. According to an instance that occurred in 2007, a Michigan treasurer gave over $1.2 million in cash to a scammer who was looking to benefit personally. Cybercrime’s most common rationale is that it may lead to a better job, which many people find appealing. An email with the subject line “2011 recruitment plan.xls” was accessed by two low-level employees of the security firm RSA in an embarrassing incident in 2011. You can visit our website in case of ابتزاز.

Keep putting up a show until you get your way.

When it comes to social engineering, pretending to be a victim is one of the most effective ways available. DEC’s OS development server had been hacked and Kevin Mitnick posed as one of the company’s high-ranking employees to get access. A new set of login credentials was promptly sent to him. During the first week of a hacker’s employment at the Department of Justice in 2016, he pretended to be a new employee and persuaded the help desk to grant him an intranet token on the grounds that he had no idea how anything worked. Even though it has occurred before, this is the first time since 1979 that it has happened again.

Firewalls have been installed in most instances to keep out these apparent impersonations, but thieves may find a way around them. A board member of Hewlett-Packard who was suspected of leaking information to the press in 2005 was given their social security numbers by private detectives hired by HP. Before giving over phone records that had been cleansed of all but the last four digits, they accepted this evidence as confirmation of identity.

Make it seem as though you’re the one in command.

Generally speaking, we’ve all been trained to respect people in positions of authority, or at least those who put on a show of authority. With some understanding of the inside workings of an organisation, you may persuade others to believe that you’re in control or have access to information that you shouldn’t have access to. More than $1 billion was transferred to criminals posing as executives at Ubiquiti Networks in 2015, according to reports. Lying to get access to victims’ voicemail accounts was used by British tabloid investigators in the late 1990s and early 2000s. By claiming to be “John from credit control,” a private investigator was able to persuade Vodafone to modify the voicemail PIN of actress Sienna Miller’s voicemail.

The demands of foreign governments are often met with slavish compliance by the United States. Vice President Biden’s chief of staff Russian hackers reportedly gained access to John Podesta’s email account in 2016 after sending an impersonating Google email requesting him to change his password. To make matters worse, a security safeguard he implemented to keep himself safe mistakenly made his login details public.