CSIRT-CAN – Centro de Respuesta a Incidentes de Seguridad de Canarias

Social Engineering: How to Manipulate the Population

News image

Technology can protect you, but social engineering is a powerful strategy for attacking and dominating social groups. 

The best defense against these threats is information, so let's clearly explain what this phenomenon is.

Social engineering consists of psychological manipulation techniques used to deceive people and obtain information, access, or money. 

Identity theft, fake calls, and phone scams are some of the best-known methods.
 

Most Common Techniques
1. Fake calls. They impersonate banks, technical support, or companies.
2. Identity theft. They impersonate colleagues, bosses, or technicians.
3. In-person deception. Physical access to offices by pretending to be authorized personnel.
4. Urgency and pressure. Act now or you will lose access.
5. False authority. They present themselves as a figure of power.
6. Trust and closeness. They create bonds to manipulate. The attackers' objectives are varied: stealing passwords, obtaining personal data, accessing systems, acquiring money, and installing malware.

How can you protect yourself from these actions?

1. Verify identities
2. Be wary of urgency
3. Do not share sensitive information
4. Cybersecurity training
5. Clear protocols in companies
6. Report suspicious attempts

When should we suspect a possible threat?

Attackers usually contact us with unexpected requests and alarmist language. This is intended to alert the victim and force them to think quickly, without considering the veracity of the information.

If we listen carefully to the information they transmit, we will discover that: there are errors in the information and requests for access to unnecessary payments. 

In this way, the victim could report the attacker, and the authorities would track down these criminal