SlideShare a Scribd company logo
1 of 34
Types of Social Engineering
Hiperdist Training series
Social Engineering
Phishing
Tailgating
Dumpster-Diving
Impersonation
Hoax
Shoulder Surfing
Lunch Time Attack
I
N
D
E
X
01
02
03
04
07
06
05
08
Social Engineering- Introduction
WHAT IS SOCIAL ENGINEERING?
It is the use of deception to manipulate
individuals into providing confidential or personal
information that may be used for fraudulent
purposes.
Social Engineering
SOCIAL ENGINEERING EXAMPLE - TARGET
ATTACK
Organization Target- 2013
Breach Dates November 27th – December
15th 2013
Date of Discovery 15th December 2013
Date of Disclosure 18th December 2013
Nature of the Breach Loss of customer
information including credit
card numbers
Scale of the Breach 40-70 million customer
records
Impact Estimated to cost Target
over $200 million plus
brand image
Social Engineering
Phishing
Phishing is a type of Cybercrime, where the
criminal pretends to be a legitimate organization
in order to get credentials, personal details or other
sensitive information.
In Phishing, the targets are usually contacted via
email, telephone or text message.
WHAT IS PHISHING?
Phishing
HOW DOES PHISHING WORK?
Attacker sends out an email pretending to
be a real organization so that, the attacker can
gain details such as a username or a
password of a victim.
You can identify this type of fraud by
graphical errors, font differences or spelling
errors when compared to the original email.
Phishing
PHISHING- EXAMPLE
Organization Facebook & Google - 2013
Phishing Attack Date December 2015
Nature of the Breach Phishing scam
Scale of the Breach $98 Million taken from
Facebook
$23 Million taken from
Google
Impact Over $100 million paid to
the Phisher
Phishing
Tailgating
WHAT IS TAILGATING?
It is a form of Social Engineering, where an individual gains
access to a building or any other area where they are not
permitted.
This attack is a physical attack.
Tailgating
HOW DOES TAILGATING WORK?
A variety of tricks can be used to Tailgate.
One such trick is when you tag into a specific location,
the person behind you enters without tagging in.
Another common technique is that the perpetrator
carries several boxes ( such as donut boxes), and
pretends that he is unable to open the door due to
the boxes in his hand, thereby gaining access to a
given location.
Tailgating
TAILGATING- EXAMPLE
A person impersonates a delivery driver and waits
outside a building. When an employee gains
security’s approval and opens their door, the
attacker asks that the employee ‘hold the door’.
Thereby gains access to the company through an
authorized person.
Tailgating
Dumpster Diving
WHAT IS DUMPSTER DIVING?
It is the act of going through personal or corporate
dumpsters in order to collect documents, physical
data or any other form of information that can be
used for personal advantage.
Dumpster Diving
HOW DOES DUMPSTER DIVING WORK?
Dumpster Diving is relatively simple. The attacker
rummages through dumpsters or garbage in order
to find important documents, devices etc.
In USA, the act of Dumpster Diving is not considered
illegal.
Dumpster Diving
DUMPSTER DIVING- EXAMPLE
Organization Oracle- 2000
Dumpster Diving Date June 2000
Nature of the Breach Dumpster Diving
Description of Attack Oracle hired private
investigators to dig through
corporate dumpsters at
Microsoft.
Dumpster Diving
Impersonation
WHAT IS IMPERSONATION?
Impersonation is another form for Social
Engineering. It is the act of pretending to be
someone else.
Impersonation
HOW DOES IMPERSONATION WORK?
The Social Engineer “impersonates” or pretends to be
someone else in order to gain the information they are looking
to acquire or gain access to a particular area.
This type of Social Engineering involves manipulating an
individual to such an extent, that they don’t even realize that a
security breach is occurring.
Impersonation
IMPERSONATION- EXAMPLE
Affected Organization Xoom Corporation- 2014
Compromise Date 2014
Description Scammers emailed an employee
from the compromised CEO’s
account and convinced them to
send $30.8 million to overseas
bank accounts
Impact Spoofed emails sent resulted
in a transfer of $30.8 million
to fraudulent accounts.
Impersonation
Hoax
WHAT IS A HOAX?
Hoaxes are also known as a false alarm. It is
a threat that doesn't actually exist, which is
meant to trick or deceive someone
Hoax
HOW DOES A HOAX WORK?
Most Hoaxes use the art of scaring someone. They
use the principle of fear in order to gain some
benefit out of the person to whom it was intended.
Usually, Hoaxes don’t cause a lot of damage besides
wasting the time of the individuals affected.
Hoax
HOAX- EXAMPLE
Organization Instagram
Description Was a Hoax that stated
Instagram’s privacy policy has
changed and can restore any
picture or message that has
been posted or deleted, and will
enable Instagram to make those
posts public, and will give
Instagram permission to use the
photos and data in court cases
in litigation against you.
Hoax
Shoulder Surfing
WHAT IS SHOULDER SURFING?
Shoulder Surfing is the act of overlooking onto
someone's screen/device in order to find out
information.
Shoulder Surfing
HOW DOES SHOULDER SURFING WORK?
This can be done by being in close vicinity to someone or by
using binoculars.
It can easily be done in crowded places.
A common way to avoid Shoulder Surfing, is by using
privacy filters.
Shoulder Surfing
SHOULDER SURFING- EXAMPLE
Criminal Ayanna Bastain
Crime Period 2014-2015
Location Walnut Creek California
Description of Attack Ayanna Bastain was caught
shoulder surfing at ATMs and
conducting theft
Shoulder Surfing
Lunch Time Attack
WHAT IS A LUNCH TIME ATTACK?
A Lunch Time Attack is an attack where the
perpetrator gains access to someone's
computer when they have left it unattended.
It is usually an insider threat/attack.
Lunch Time Attack
HOW DOES A LUNCH TIME ATTACK WORK?
The perpetrator gain access to a victims logged on
computer/ device when they have gone for lunch.
The perpetrator can then find out whatever
information he is looking for, from the logged on
device.
Lunch Time Attack
HOW CAN YOU PROTECT YOURSELF FROM A LUNCH TIME ATTACK?
Lock your laptop/devices at all times and secure your
personal belongings, to prevent an unauthorized
individual access your devices.
Lunch Time Attack
Thank you for watching!
For more information on Cybersecurity, please visit us at www.hiperdistuae.com or
email us at marketing@hiperdist.ae

More Related Content

What's hot

Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
Michael Sexton
 

What's hot (15)

Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Accurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than RetaliatingAccurately Attributing the Sony Hack is More Important than Retaliating
Accurately Attributing the Sony Hack is More Important than Retaliating
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Social engineering
Social engineering Social engineering
Social engineering
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 

Similar to Types of Social engineering

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Similar to Types of Social engineering (20)

Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Cyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptxCyber Security PowerPoint Templates.pptx
Cyber Security PowerPoint Templates.pptx
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
Expert FSO Insider Threat Awareness
Expert FSO Insider Threat AwarenessExpert FSO Insider Threat Awareness
Expert FSO Insider Threat Awareness
 
Social Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark ArtsSocial Engineering Techniques - The Dark Arts
Social Engineering Techniques - The Dark Arts
 
Social Engineering by Riziq Ramadani
Social Engineering by Riziq RamadaniSocial Engineering by Riziq Ramadani
Social Engineering by Riziq Ramadani
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptxInternet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
Internet 2.0 Conference Reviews Legit Ways To Spot Phishing Scam Offenses.pptx
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 
computer law.pptx
computer law.pptxcomputer law.pptx
computer law.pptx
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
 
ICS201--C3
ICS201--C3ICS201--C3
ICS201--C3
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 

Types of Social engineering

  • 1. Types of Social Engineering Hiperdist Training series
  • 4. WHAT IS SOCIAL ENGINEERING? It is the use of deception to manipulate individuals into providing confidential or personal information that may be used for fraudulent purposes. Social Engineering
  • 5. SOCIAL ENGINEERING EXAMPLE - TARGET ATTACK Organization Target- 2013 Breach Dates November 27th – December 15th 2013 Date of Discovery 15th December 2013 Date of Disclosure 18th December 2013 Nature of the Breach Loss of customer information including credit card numbers Scale of the Breach 40-70 million customer records Impact Estimated to cost Target over $200 million plus brand image Social Engineering
  • 7. Phishing is a type of Cybercrime, where the criminal pretends to be a legitimate organization in order to get credentials, personal details or other sensitive information. In Phishing, the targets are usually contacted via email, telephone or text message. WHAT IS PHISHING? Phishing
  • 8. HOW DOES PHISHING WORK? Attacker sends out an email pretending to be a real organization so that, the attacker can gain details such as a username or a password of a victim. You can identify this type of fraud by graphical errors, font differences or spelling errors when compared to the original email. Phishing
  • 9. PHISHING- EXAMPLE Organization Facebook & Google - 2013 Phishing Attack Date December 2015 Nature of the Breach Phishing scam Scale of the Breach $98 Million taken from Facebook $23 Million taken from Google Impact Over $100 million paid to the Phisher Phishing
  • 11. WHAT IS TAILGATING? It is a form of Social Engineering, where an individual gains access to a building or any other area where they are not permitted. This attack is a physical attack. Tailgating
  • 12. HOW DOES TAILGATING WORK? A variety of tricks can be used to Tailgate. One such trick is when you tag into a specific location, the person behind you enters without tagging in. Another common technique is that the perpetrator carries several boxes ( such as donut boxes), and pretends that he is unable to open the door due to the boxes in his hand, thereby gaining access to a given location. Tailgating
  • 13. TAILGATING- EXAMPLE A person impersonates a delivery driver and waits outside a building. When an employee gains security’s approval and opens their door, the attacker asks that the employee ‘hold the door’. Thereby gains access to the company through an authorized person. Tailgating
  • 15. WHAT IS DUMPSTER DIVING? It is the act of going through personal or corporate dumpsters in order to collect documents, physical data or any other form of information that can be used for personal advantage. Dumpster Diving
  • 16. HOW DOES DUMPSTER DIVING WORK? Dumpster Diving is relatively simple. The attacker rummages through dumpsters or garbage in order to find important documents, devices etc. In USA, the act of Dumpster Diving is not considered illegal. Dumpster Diving
  • 17. DUMPSTER DIVING- EXAMPLE Organization Oracle- 2000 Dumpster Diving Date June 2000 Nature of the Breach Dumpster Diving Description of Attack Oracle hired private investigators to dig through corporate dumpsters at Microsoft. Dumpster Diving
  • 19. WHAT IS IMPERSONATION? Impersonation is another form for Social Engineering. It is the act of pretending to be someone else. Impersonation
  • 20. HOW DOES IMPERSONATION WORK? The Social Engineer “impersonates” or pretends to be someone else in order to gain the information they are looking to acquire or gain access to a particular area. This type of Social Engineering involves manipulating an individual to such an extent, that they don’t even realize that a security breach is occurring. Impersonation
  • 21. IMPERSONATION- EXAMPLE Affected Organization Xoom Corporation- 2014 Compromise Date 2014 Description Scammers emailed an employee from the compromised CEO’s account and convinced them to send $30.8 million to overseas bank accounts Impact Spoofed emails sent resulted in a transfer of $30.8 million to fraudulent accounts. Impersonation
  • 22. Hoax
  • 23. WHAT IS A HOAX? Hoaxes are also known as a false alarm. It is a threat that doesn't actually exist, which is meant to trick or deceive someone Hoax
  • 24. HOW DOES A HOAX WORK? Most Hoaxes use the art of scaring someone. They use the principle of fear in order to gain some benefit out of the person to whom it was intended. Usually, Hoaxes don’t cause a lot of damage besides wasting the time of the individuals affected. Hoax
  • 25. HOAX- EXAMPLE Organization Instagram Description Was a Hoax that stated Instagram’s privacy policy has changed and can restore any picture or message that has been posted or deleted, and will enable Instagram to make those posts public, and will give Instagram permission to use the photos and data in court cases in litigation against you. Hoax
  • 27. WHAT IS SHOULDER SURFING? Shoulder Surfing is the act of overlooking onto someone's screen/device in order to find out information. Shoulder Surfing
  • 28. HOW DOES SHOULDER SURFING WORK? This can be done by being in close vicinity to someone or by using binoculars. It can easily be done in crowded places. A common way to avoid Shoulder Surfing, is by using privacy filters. Shoulder Surfing
  • 29. SHOULDER SURFING- EXAMPLE Criminal Ayanna Bastain Crime Period 2014-2015 Location Walnut Creek California Description of Attack Ayanna Bastain was caught shoulder surfing at ATMs and conducting theft Shoulder Surfing
  • 31. WHAT IS A LUNCH TIME ATTACK? A Lunch Time Attack is an attack where the perpetrator gains access to someone's computer when they have left it unattended. It is usually an insider threat/attack. Lunch Time Attack
  • 32. HOW DOES A LUNCH TIME ATTACK WORK? The perpetrator gain access to a victims logged on computer/ device when they have gone for lunch. The perpetrator can then find out whatever information he is looking for, from the logged on device. Lunch Time Attack
  • 33. HOW CAN YOU PROTECT YOURSELF FROM A LUNCH TIME ATTACK? Lock your laptop/devices at all times and secure your personal belongings, to prevent an unauthorized individual access your devices. Lunch Time Attack
  • 34. Thank you for watching! For more information on Cybersecurity, please visit us at www.hiperdistuae.com or email us at marketing@hiperdist.ae