What is Social Engineering?
Threat actors are always thinking of creative ways to target individuals and businesses, trying to acquire personal information, login credentials, getting the user to download malicious software or other sensitive information. One of the most common trends today is social engineering.
Social engineering is pretending to be someone else to fool a person into revealing sensitive information, passwords, or other information that compromises a target system’s security.
Do not become a victim of social engineering by unwittingly giving out information to an unknown person. A skilled social engineer will convince you that:
- they are someone they are not, and
- there is no harm in giving them the information they are requesting or entering information on malicious websites that appear to be genuine.
Impact on Physical Penetration Testing
Social engineering plays a substantial role in physical penetration testing. This is all about creating a credible pretext or situation to gain access. One common pretext is impersonating IT support and requesting user passwords. Another common one is posing as an employee who usually works in another area needing access to secured areas. A physically present attacker can steal or copy keys and badges, post misleading paper signs, or snap photos of sensitive information on whiteboards or sticky notes which are otherwise considered “safe” from digital attack.
Social engineering leverages human psychology, often eliciting emotional responses and encouraging individuals to overlook red flags. A helpful tool for attackers who go to places, as people trust and obey social engineers’ requests. A penetration tester will often use social engineering when conducting a vulnerability assessment or physical pen test.