Social Engineering Awareness: Protecting Yourself and Others from Manipulation

Dr. Jaber Kakar
4 min readAug 28, 2023

--

In the complex world of cyber threats, a dangerous thread is running through — the art of social engineering. This article delves into the captivating world of social engineering, revealing its tactics, providing real-life instances, and giving you the tools to protect yourself and others from its devious strategies. Moreover, we’ll uncover how artificial intelligence (AI) and deep fakes have escalated the potency of social engineering attacks.

Social Engineering Attacks — Exploiting human psychology

Manipulation: Exploiting Human Weaknesses

Social engineering breaches digital fortifications by targeting a universal vulnerability: human nature. Let’s uncover this aspect in greater detail:

  • Phishing: Seemingly genuine emails trick you into revealing sensitive information, unleashing a flood of cyber threats. Phishing attacks aim to achieve a variety of goals, including but not limited to:
  1. Credential Theft: Attackers seek your usernames and passwords, gaining unauthorized access to your accounts.
  2. Financial Fraud: Attackers trick you into providing banking details or credit card information, facilitating financial theft.
  3. Malware Delivery: Clicking on malicious links or attachments infects your device with malware.
  4. Identity Theft: Personal data shared in response to phishing can lead to identity theft.
  • Pretexting: Fabricated scenarios manipulate the victim’s trust, often by masquerading as colleagues or authority figures to extract their sensitive information.
  • Baiting: Alluring baits like USB drives deliver malware upon connection, inviting malicious entities into your system.
  • Quid Pro Quo: Attackers offer incentives, exploiting your desire for gain in exchange for sensitive data or actions.
  • Tailgating: Unauthorized individuals gain entry to secure areas by following authorized personnel, exploiting trust and convenience.
  • CEO Fraud: Cybercriminals impersonate high-level executives, manipulating employees into transferring funds or divulging sensitive information.

AI and Deep Fakes: Amplifying Deception

As AI matures, cyber attackers harness its power to amplify social engineering. So-called deep fakes work on the basis of AI-generated manipulated media which includes:

  1. Textual deep fakes: AI automates personalized phishing emails, increasing believability and success rates.
  2. Deep Fake Images: Fake images are generated through means of AI. Such fakes are predominately used in social media to spread fake images that are generated from real photographs where real bodies and faces are replaced by fake ones.
  3. Chatbot Deception: AI-powered chatbots simulate legitimate interactions, luring users into sharing sensitive information.
  4. Voice Synthesis: AI replicates voices, making impersonation calls more convincing and difficult to detect.
  5. Deep Fake Videos: AI-generated videos manipulate appearances and voices, posing a significant threat to authenticity and trust.
  6. Real-time/live deep fakes: Fake audio or video material can be generated in real time. With such technology in place, attackers can bypass security measures such as voice-based authentication.

For those interested in AI, a remark on how these deep fakes are generated. As the name suggests, they work based on a machine learning architecture known as deep neural networks. These deep neural networks are used in the form of so-called Generative Adversarial (Neural) Networks (GANs) to generate deep fakes. You may want to try out the following web app for fun.

Real-Life Examples of Social Engineering Attacks

There are many examples of social engineering attacks. However, for the sake of brevity, we list 3 of them and briefly discuss how they happened:

  1. High-Profile Twitter Hack (2020): Hackers orchestrated a Bitcoin scam by exploiting social engineering techniques, and manipulating Twitter employees to gain access to prominent accounts.
  2. Google and Facebook Spear Phishing Scam (2013–2015): A Lithuanian national set up a fake company, posing as a legitimate computer manufacturer working with Google and Facebook. Through targeted spear phishing emails, he tricked employees into depositing over $100 million into fraudulent accounts.
  3. Deep Fake Attack on UK Energy Company (2019): A UK energy company’s CEO received a convincing phone call from someone who sounded exactly like his boss. The call led to a transfer of $243,000 to a scammer’s bank account, illustrating the real danger of deep fake audio manipulation.

Strengthening Your Defense

  1. Educate and Train: Stay informed about social engineering tactics and educate employees to recognize and resist manipulation.
  2. Verify Vigilantly: Cross-check requests through separate channels before sharing confidential data or complying.
  3. Mind Your Online Presence: Restrict personal information shared online to minimize ammunition for cyber attackers.
  4. AI-Enhanced Security: Employ AI-driven solutions to counter AI-powered threats, leveraging technology to outwit manipulators.

Resilience Through Knowledge

In an AI-infused world, social engineering continues to thrive. By understanding its methods, acknowledging its impact, and adapting preventive measures, you bolster your defenses against both human and AI-driven manipulation. With deep fakes in the arsenal, staying vigilant and aware is more crucial than ever.

Stay prepared as we embark on our next article, exploring “Hands-On Exploitation: Safely Testing System Vulnerabilities”.

Thanks for reading! If you want to learn more about Ethical Hacking, please subscribe to this blog. We will constantly be posting articles to help you start your cyber security journey as an ethical hacker!

--

--

Dr. Jaber Kakar

🔐 Cybersecurity Enthusiast | Ethical Hacker in the Making | Exploring the Digital Battlefield | Sharing Insights to Safeguard the Online Realm 🔐