Social Engineering

“ The psychological manipulation of people to trick them into divulging sensitive information or performing actions that compromise security. ”

Social engineering works because people are predictable: attackers exploit natural tendencies like trust, helpfulness, fear, curiosity, and the desire to follow authority.¹ Rather than breaking technical defenses, social engineers manipulate emotions and social cues to bypass them. For example, invoking authority (pretending to be a boss, IT technician, or government official) pressures targets to comply without questioning; creating a sense of urgency (a “payment failed” or “your account will close” message) short-circuits careful thought and prompts immediate action; and using familiarity (mentioning a colleague’s name, a recent purchase, or other specifics) builds credibility and lowers suspicion. Attackers also rely on angles like reciprocity (offering help or a favor to elicit cooperation), scarcity (a “limited time” offer), social proof (claiming others have already acted), and curiosity (teasing surprising or sensational content) to trick people into revealing information, clicking links, or installing malware.

Spot the Scam - is this message legit?

Read the message and choose Legit or Scam.

From: support@paypal-security.com
Subject: Urgent: Verify your account now

Dear user, we detected suspicious activity on your account. Log in immediately to avoid closure: paypal.verify-now.example/login

Phishing scams are a form of social engineering. An attacker will use their understanding of human nature and any reconnaissance performed prior to sending the message to trick the recipient into doing what they want. Sometimes phishing aims to have a user type their username and password into a fraudulent site without realizing their mistake, and other messages try to convince people to send money based on the fake story they were given.

Attackers adapt their techniques to each situation, but successful social engineering campaigns generally follow a predictable lifecycle: reconnaissanceplanningdeliveryexploitationescalationcleanup.² First, adversaries perform reconnaissance using open-source intelligence (OSINT). They scour social media, corporate websites, public records, and breached-data dumps to identify high value targets and harvest personal details that make a pretext believable. That research informs the planning phase, where the attacker chooses the vector (email, SMS, phone, social platform, or physical approach), crafts a tailored message or role (the pretext), and prepares any technical infrastructure needed (spoofed domains, throwaway email accounts, malicious files, or fake landing pages).

During execution the attacker times and delivers the pretext to maximize credibility, often using details that mimic the target’s normal communications (colleagues’ names, recent transactions, or company parlance). If the target responds, the exploit stage begins: the attacker may harvest credentials via a convincing fake login page, trick the victim into installing malware through an attachment or link, or coax sensitive information out directly. Skilled operators then attempt to escalate access (using harvested credentials to reach additional accounts), establish persistence (creating backdoors, secondary accounts, or installing remote-access tools), and move laterally within networks or social circles to broaden their reach.

In the final steps of a social engineering effort, attackers focus on converting their gains and erasing evidence. They move what they took from the target discretely using VPNs, compromised proxies, short-lived domains, and burner accounts to cash out without being linked to the attack. To maximize return, criminals often sell data on illicit marketplaces, reroute funds through crypto services, or lock victims with ransomware for direct payment.³ Simultaneously they scrub logs, remove or alter forensic artifacts, and retire the tools used in the attack to make it harder to trace back to them.

This is the playbook of a highly competent cybercriminal, someone who researches, plans, and executes attacks with care and sophistication. Social engineering can be motivated by a lot of things, but well-orchestrated campaigns are most often aimed at businesses or high value individuals (because that’s where the biggest gains are). Everyday users are still valuable targets for simpler scams and opportunistic fraud, though, using the same psychological angles. Most individual-focused attacks rely on basic human errors, so straightforward defenses and good habits go a long way in protecting against them.

Spot the Scam - is this message legit?

Read the message and choose Legit or Scam.

From: service@paypal.com
Subject: Your recent PayPal transaction has been completed

Hello [ Your Name ],

This email confirms that your recent payment to TechWorld Electronics for $49.99 has been successfully processed using your PayPal account.

Transaction ID: 1AB23456CD7890123
Date: October 16, 2025

You can view the full transaction details by logging into your PayPal account at www.paypal.com.

If you didn’t authorize this payment, please report it directly from your PayPal account’s Resolution Center after logging in.

Thank you for using PayPal.

- The PayPal Team

Defending Against Social Engineering

The best defense against social engineering isn’t a piece of software, it’s awareness. Attackers rely on manipulating human instincts like trust, curiosity, or fear, so training yourself to slow down and verify is key. Be cautious of any unexpected message that asks for personal information, login credentials, or payment, especially if it pressures you to act quickly. Real organizations rarely demand instant responses or threaten immediate consequences. When in doubt, verify through a known, official channel. For example, you could call a company directly using the number from its official website, not one provided in the message.

Technical defenses still play a strong supporting role. Multi-factor authentication can stop an attacker even if your password is stolen. Email filters, anti phishing tools, and browser security settings can block many malicious messages before they even reach you. Keeping software and operating systems up to date closes vulnerabilities that social engineers sometimes exploit after a successful phishing attempt. Together, these measures reduce both the likelihood of being deceived and the damage if an attempt succeeds.

Businesses often build resilience through policies and repetition. Regular phishing simulations, clear reporting procedures, and access to training help employees practice safe responses until they become habits. Encouraging open communication is vital, people should feel comfortable reporting suspicious messages without fear of blame. At the end of the day, social engineering defense is about critical thinking as much as technology. By recognizing manipulation tactics and applying a few consistent security habits (verify before trusting, protect your credentials, and stay skeptical of urgency) you make yourself a much harder target.

¹ ”A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing Countermeasures”, by Ahmed Siddiqi, M, Pak, W, and Siddiqi, M, June 2022
² ”Social engineering – ITSAP.00.166”, Canadian Centre for Cyber Security, October 2023
³ “Social Engineering Cyber Threats”, by Choi, Y. B. and Rubin, J, December 2023