Steve

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve ‘s profile picture and the description given for his profile, and she conversation with him soon after accepting the request. After a few days, Steve started asking about her company details and eventually gathered all the essential information regarding her company. What is the social engineering technique Steve employed in the above scenario?

Option 1 : Baiting
Option 2 : Honey trap
Option 3 : Diversion theft
Option 4 : Piggybacking

1. Baiting

As its name implies, baiting attacks use a false promise to pique a victim’s greed or curiosity. They lure users into a lure that steals their personal info or inflicts their systems with malware.

The most reviled form of baiting uses physical media to disperse malware. as an example, attackers leave the bait—typically malware-infected flash drives—in conspicuous areas wherever potential victims are certain to see them (e.g., bathrooms, elevators, the parking lot of a targeted company). The bait has an authentic look thereto, like a label presenting it because the company’s payroll list.

Victims acquire the bait out of curiosity and insert it into a piece or home computer, leading to automatic malware installation on the system.

Baiting scams don’t essentially ought to be carried out within the physical world. on-line kinds of baiting consist of enticing ads that cause malicious sites or that encourage users to download a malware-infected application.

2. Honey trap

An attack in which the social engineer pretends to be an attractive person to move with someone on-line, fake an online relationship and gather sensitive info through that relationship.

3. Diversion theft

Offline, diversion thefts involve intercepting deliveries by persuading couriers the wrong to the incorrect location. Online, they involve stealing confidential information by persuading victims to send it to the wrong recipient.

4. Piggybacking

Piggybacking, also known as tailgating, is once an unauthorized person physically follows a licensed person into a restricted company space or system. One tried-and-true technique of piggybacking is once a hacker calls bent on an employee to carry a door open for them as they’ve forgotten their ID card. Another technique involves someone asking an worker to “borrow” his or her laptop for some minutes, during that the criminal is ready to quickly install malicious software.

Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment