Although the number of social engineering attacks is unlimited, they all have the following typical features:
Password theft
In terms of this common feature, hackers use information from social network files to guess a victim's password prompt. This technology is used to send emails to Twitter and Sarah Palin.
Handle Web threats
Download nowFriending: in this case, hackers will try to gain the trust of one or more people and trick them into clicking links or attachments containing malware to introduce security threats to their computers, for example, use the weakness of the enterprise system. Netragard CTO Adriel Desautels says, for example, he can start a phishing session and then send a picture of the boat he wants to buy.
Pretend to need your help
In this case, the hacker will send you a message and use the name of your friend to contact you. Then ask you to help him, for example, ask you to send him a workbook or send some data to him from the "office. "Anything you see from a computer may be forged by hackers. "Desautels said.
Disguised as your internal staff
If you pretend to be an IT help staff, you can imagine that you can get everything you want from an employee who never knows. "Almost 90% of the people we used once trust us because they think we work with them. "Desautels said.
In the Netragard blog, he described a vulnerability in which a staff member of Netragard disguised as an internal employee and successfully sent a phishing plan to their users, in this way, he collected employee certificates and finally obtained the right to access the entire enterprise infrastructure.