Tailgating is a form of social engineering that allows hackers to

We all know about the attacker who leverages their technical expertise to infiltrate protected computer systems and compromise sensitive data. This type of malicious actor ends up in the news all the time. But they’re not the only ones making headlines. So too are “social engineers,” individuals who use phone calls and other media to exploit human psychology and trick people into handing over access to the organization’s sensitive information. Social engineering is a term that encompasses a broad spectrum of malicious activity.

What is Social Engineering?

Social Engineering is the malicious act of tricking a person into doing something by messing up his emotions and decision-making process.

According to Digital Guardian, "Social engineering attacks typically involve some form of psychological manipulation, fooling otherwise unsuspecting users or employees into handing over confidential or sensitive data. Commonly, social engineering involves email or other communication that invokes urgency, fear, or similar emotions in the victim, leading the victim to promptly reveal sensitive information, click a malicious link, or open a malicious file."

Types of Social Engineering Attacks

For the purposes of this article, let’s focus on the five most common attack types that social engineers use to target their victims. These are phishing, pretexting, baiting, quid pro quo, and tailgating.

1. Phishing

Phishing is the most common type of social engineering attack. At a high level, most phishing scams aim to accomplish three things:

  • Obtain personal information such as names, addresses, and Social Security Numbers;
  • Use shortened or misleading links that redirect users to suspicious websites that host phishing landing pages; and
  • Leverage fear and a sense of urgency to manipulate the user into responding quickly.

No two phishing emails are the same. There are at least six different sub-categories of phishing attacks. Beyond that, we all know that phishers invest varying amounts of time into crafting their attacks. Hence why there are so many phishing messages with spelling and grammar errors.

Phishing Attack Example:

A recent phishing campaign used LinkedIn branding to trick job hunters into thinking that people at well-known companies like American Express and CVS Carepoint had sent them a message or looked them up using the social network, wrote ThreatPost. If they clicked on the email links, recipients found themselves redirected to pages designed to steal their LinkedIn credentials.

2. Pretexting

Pretexting is another form of social engineering where attackers focus on creating a pretext, or a fabricated scenario, that they can use to steal someone’s personal information. In these types of attacks, the scammer usually impersonates a trusted entity/individual and says they need certain details from a user to confirm their identity. If the victim complies, the attackers commit identity theft or use the data to conduct other malicious activities. More advanced pretexting involves tricking victims into doing something that circumvents organization’s security policies.

Pretexting Attack Example:

An attacker might say they’re an external IT services auditor so that the organization’s physical security team will let them into the building. Whereas phishing uses fear and urgency to their advantage, pretexting relies on building a false sense of trust with the victim. This requires building a credible story that leaves little room for doubt in the mind of their target. It also involves choosing a suitable disguise. As such, pretexting can and does take on various forms.

Many threat actors who engage in pretexting masquerade as HR personnel or finance employees so that they can try to target C-Level executives. As reported by KrebsOnSecurity, others spoof banks and use SMS-based text messages about suspicious transfers to call up and scam anyone who responds.

3. Baiting

Baiting is in many ways like phishing.

The difference is that baiting uses the promise of an item or good to entice victims. Baiting attacks may leverage the offer of free music or movie downloads to trick users into handing their login credentials, for example. Alternatively, they can try to exploit human curiosity via the use of physical media.

Baiting Attack Example:

Back in July 2018, for instance, KrebsOnSecurity reported on an attack targeting state and local government agencies in the United States. The operation sent out Chinese postmarked envelopes that included a confusing letter along with a CD. The point was to pique recipients’ curiosity so that they would load the CD and inadvertently infect their computers with malware.

4. Quid Pro Quo

Like baiting, quid pro quo attacks promise something in exchange for information. This benefit usually assumes the form of a service, whereas baiting usually takes the form of a good.

Quid Pro Quo Attack Example:

One of the most common types of quid pro quo attacks is when fraudsters impersonate the U.S. Social Security Administration (SSA). These fake SSA personnel contact random people and ask them to confirm their Social Security Number, allowing them to steal their victims’ identities. In other cases detected by the Federal Trade Commission (FTC), malicious actors set up fake SSA websites designed to steal those people’s personal information instead It is important to note that attackers can use quid pro quo offers that are even less sophisticated, however. Earlier attacks have shown that office workers are more than willing to give away their passwords for a cheap pen or even a bar of chocolate.

5. Tailgating

Our final social engineering attack type is known as “tailgating.” In these types of attacks, someone without the proper authentication follows an authenticated employee into a restricted area.

Tailgating Attack Examples:

The attacker might impersonate a delivery driver and wait outside a building to get things started. When an employee gains security’s approval and opens the door, the attacker asks the employee to hold the door, thereby gaining access to the building. Tailgating does not work in the presence of certain security measures such as a keycard system. However, in organizations that lack these features, attackers can strike up conversations with employees and use this show of familiarity to get past the front desk. In fact, Colin Greenless, a security consultant at Siemens Enterprise Communications, used these tactics to gain access to multiple floors and the data room at an FTSE-listed financial firm. He was even able to set up shop in a third floor meeting room and work there for several days.

Ways to Prevent Social Engineering Attacks

As the attacks discussed above illustrate, social engineering involves preying off human psychology and curiosity to compromise victims’ information. With this human-centric focus in mind, organizations must help their employees counter these types of attacks. They can do so by incorporating the following tips into their security awareness training programs.

  • Do not open any emails from untrusted sources. Contact a friend or family member in person or by phone if you receive a suspicious email message from them.
  • Do not give offers from strangers the benefit of the doubt. If they seem too good to be true, they probably are.
  • Lock your laptop whenever you are away from your workstation.
  • Purchase anti-virus software. No AV solution has a 100% detection rate, but they can help to defend against campaigns that use social engineering tactics.
  • Read your company’s privacy policy to understand under what circumstances you can or should let a stranger into the building.

 

 

Media

Image

Tailgating is a form of social engineering that allows hackers to

Text

GET THE REPORT

Analysis of hundreds of thousands of phishing, social media, email, and dark web threats show that social engineering tactics continue to prove effective for criminals. Download the report to learn more.

What are examples of tailgating attacks?

Examples of a tailgating attack The most common example of an innocuous tailgating attack is the attacker requesting for someone to hold open a locked door. By manipulating the victim's goodwill, the fraudster can enter without proper verification.

What is hacker tailgating?

What is Tailgating? Tailgating, also known as piggybacking, is one of the most common ways for hackers, thieves and other unsavory characters to gain access to restricted areas. After all, it's easier to just follow an authorized person into a company than breaking into it.

Is a form of social engineering that allows hackers to?

Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO Fraud are all examples.

Why is social engineering used by hackers?

Social engineering is a popular tactic among attackers because it is often easier to exploit people than it is to find a network or software vulnerability. Hackers will often use social engineering tactics as a first step in a larger campaign to infiltrate a system or network and steal sensitive data or disperse ...