What Paths Do Social Engineers Follow?

In social engineering attacks using information technologies, we usually encounter them in the form of phishing (e-mail), vishing (phone calls) or text messages. In target! attacks, spear phishing is us!. However, there may be many other methods besides these. Although it may be hard to believe, social engineers can obtain your address information from documents you consider worthless and throw away, and information about the places you go from receipts you throw away.

Social engineering is the art of deceiving people by

 

influencing their psychology and using their weaknesses with persuasion methods. Yes, no matter how bad it serves a purpose, it is an art and requires a lot of skill. They collect information about the victims they will victimize and make a plan. They even have backup plans beyond Plan A, such as Plan B and Plan C, to recover from a possible error situation. In this way, they can proce! systematically. The information collect! is appli! gradually when the time comes to attack. Social engineering experts basically find people’s weaknesses, touch their soft underbelly. They learn their personal and private information, and collect information about the person. Examples of these include many elements such as name, surname, address information, turkey whatsapp number data 5 million areas of interest, animals they fear, and close friends. We come across many examples of social engineering in online banking and shopping transactions, marketing and advertising strategies. One of the issues we ne! to be careful about is not to fall for these strategies imm!iately and not to share our information without examining.

 

ocial engineers things get easier after

 

they gain a sense of trust. The sense of trust felt by the other party, namely the victim, makes it much easier to obtain the desir! information. In fact, social engineers can learn more information that they will not use, will not be useful to them, and may not want to learn.
Another feature that how ai is changing procurement: machine customers and the staffing crisis attackers use is to act like someone else. They can easily deceive the victim by acting like someone the victim knows but has rarely seen or never spoken to. They get the information they want more easily as a familiar person. Because some people are more accepting of helping people they know than people they do not know. Or, attackers can perform social engineering applications during a conversation that starts with creating text services common areas (such as hobbies) from the information collect! for the victim and making the victim feel that they are interest! in that common area by chatting about that subject.

Apart from these, there are social engineers who are completely focus! on playing on people’s emotions and wearing them out. For example, if a social engineer tells a person that if they do not give him the information he wants, he will be fir! or imprison!, the victim will probably give the information he wants. Likewise, if the attacker affects the victim psychologically, the potential for reaching the same result is high.

 

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top