NDPX - Social Engineering Awareness
NDPX - Social Engineering Awareness
July 2023
07/08/2023 CONFIDENTIAL 1
Social Engineering Methods
07/08/2023 CONFIDENTIAL 2
What is Social Engineering?
The definition
• Instead of exploiting technical vulnerabilities from infrastructure or software, it exploits human psychology.
• Attackers will often use deceptive tactics to trick individuals into revealing sensitive information or
performing actions that compromise security
07/08/2023 CONFIDENTIAL 3
Phishing Attacks
Summary of Phishing Attacks
07/08/2023 CONFIDENTIAL 4
Examples of Phishing Attacks
Example 1 - PayPal
07/08/2023 CONFIDENTIAL 5
Examples of Phishing Attacks
Example 2 – HTML Attachment
07/08/2023 CONFIDENTIAL 6
Pretexting Attacks
Summary of Pretexting Attacks
While Phishing relies on fear and urgency, Attackers may impersonate colleagues,
Pretexting aims to build a sense of trust with authorities, or trusted entities to deceive
the victim victims.
07/08/2023 CONFIDENTIAL 7
Pretexting Attacks
Summary of Pretexting Attacks
07/08/2023 CONFIDENTIAL 8
Pretexting Examples
Famous Pretexting Events
• In 2006, Hewlett-Packard hired private investigators to see if board members were leaking news to the
press. To do this, the PI’s posed as board members and managed to extract their call records from
phone companies.
• In 2015, Ubiquiti Networks Inc. transferred $39.1 million dollars to a scammer posing as a trusted
employee acting on behalf of top executives. This is also known as a CEO fraud scam.
• In 2017, MacEwan University transferred $9 million dollars to a fraudster posing as a vendor and
requesting staff members to update their payment details via email.
07/08/2023 CONFIDENTIAL 9
Pretexting Techniques
Common Pretexting Techniques
• Impersonation – Mimics the actions of someone else, typically a person the victims trusts, such as a friend or co-
worker. This requires establishing credibility, usually done through phone numbers or email addresses of fake
organizations or people.
• Tailgating/Piggybacking – Gaining unauthorised entry into physical secured locations by posing as an authorised
individual, or by detecting faults in security or processes. Pretending to have misplaces tags/posing as a vendor.
• Baiting – Lures a target into a trap to steal sensitive information or spread malware. Possibly involves giving them
a flash drive with malware on it. The bait frequently has authentic looking elements on it such as company logo.
• Scareware – Overwhelms targets with messages of fake dangers. For example, a scareware attack may fool a target
into thinking malware has been installed on their computer. The victim is then asked install “security” software,
which is actually malware.
07/08/2023 CONFIDENTIAL 10
2023 Phishing Tactics
New tactics used by Fraudsters to bypass filters
07/08/2023 CONFIDENTIAL 11
Translation-Based Phishing
Using Google Translate to Mask URL
07/08/2023 CONFIDENTIAL 12
Image-Based Phishing
No text in email bypassing phishing text detection
07/08/2023 CONFIDENTIAL 13
Use of Special Characters
Using special characters to bypass Phishing filters
07/08/2023 CONFIDENTIAL 14
Detecting Attacks
07/08/2023 CONFIDENTIAL 15
Recognising Social Engineering Attacks
• Pay attention to email addresses, URLs, and the overall legitimacy of communication.
• Verify requests through independent channels (e.g., phone calls) rather than relying solely on emails.
• Regularly educate employees about the latest social engineering techniques and tactics.
07/08/2023 CONFIDENTIAL 16
Quiz
07/08/2023 CONFIDENTIAL 17
Thank You
07/08/2023 CONFIDENTIAL 18