The popular conception of cyberattacks and hacking is of someone exploiting a vulnerability in software to gain access to a system. However, most of the time, this isn’t the case. Instead of targeting software and computers, many cyberattackers focus their efforts on their human users. Social engineering and phishing attacks are two prime examples of this technique.
Social engineering attacks use deception, coercion, and similar techniques to induce their target to do what the attacker wants. The attacker may pretend to be a colleague, an authority figure, a trusted vendor, or someone else that the target would trust and want to help. Alternatively, the attacker could threaten to expose sensitive or damaging information if the target doesn’t comply with their wishes or could offer a bribe for the target’s assistance.
Social engineering attacks can be performed in various ways. They may involve computers, use the phone, or happen in person. For example, pretending to be a mail carrier or asking someone to hold the door are classic examples of social engineering attacks designed to gain physical access to a secure area.
Phishing attacks use malicious messages to get the target to do the attacker’s bidding. Often, these messages come with an embedded link or an attached file with malicious content. If the user clicks on the link or opens the file, they may be taken to a webpage that steals sensitive information or install malware on their computer.
However, not all phishing attacks require this malicious link or file. Some are designed to trick the user into taking some action with no malicious content involved. For example, business email compromise (BEC) attacks often involve fake invoices for services that were allegedly performed for the company. These invoices don’t contain malware, but, if the recipient believes and pays the invoice, then the money goes to the attacker.
Phishing is commonly associated with emails, but any messaging platform can be used to perform these attacks. Phishing over text messages is named smishing (for SMS phishing), and social media, corporate collaboration platforms, and similar solutions can also be used to perform phishing attacks.
Social engineering and phishing are related concepts. In fact, phishing is a particular type of social engineering attack.
Social engineering refers to the techniques that an attacker uses to induce their target to do the attacker’s bidding. In the case of a phishing attack, the attacker uses some form of messaging platform to send links, malicious attachments, or other types of deceptive, enticing, or threatening content to the recipient in order to get them to do the attacker’s bidding.
Phishing attacks are the most common type of social engineering and several variations, including spear phishing and whaling. However, there are also other forms of social engineering attacks, including:
Baiting: In this attack, the attacker promises something valuable to the target in exchange for providing sensitive information or some other action.
Organizations can implement a wide range of protections against social engineering attacks, including the following:
Social engineering attacks come in various forms. Learn more about the social engineering threat in Check Point’s Social Engineering ebook.
By far, phishing is the most common social engineering threat, and email security solutions are an effective defense. Read more in the Forrester Wave for Enterprise Email Security 2023. Check Point Harmony Endpoint offers a range of features designed to minimize the risk of social engineering and phishing attacks. See what it can do for your organization with a free demo.