{"id":6093,"date":"2020-06-17T00:04:37","date_gmt":"2020-06-16T23:04:37","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6093"},"modified":"2021-04-09T00:08:05","modified_gmt":"2021-04-08T23:08:05","slug":"social-engineering-beyond-the-inbox","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox","title":{"rendered":"Social Engineering Beyond the Inbox"},"content":{"rendered":"<p>Not all cyberattacks require high-tech wizardry to pull off. Attack vectors requiring technical knowledge certainly do occur, but a good portion of cyberattacks begin with simple social engineering.<\/p>\n<p>The most common form of social engineering is phishing. However, it\u2019s not the only form. In this blog, we\u2019ll talk about phishing and several other forms of social engineering. But first, let\u2019s talk about what social engineering is and why it\u2019s so effective.<\/p>\n<h3>Psychological vulnerabilities<\/h3>\n<p>Hacking involves breaking into a network or device by exploiting vulnerabilities in code, IT infrastructure, the network, or device communications. Social engineering, on the other hand, exploits vulnerabilities in human psychology.<\/p>\n<p>Humans are both wired and socialized to fall for some of these schemes. For example, one of the major social engineering techniques involves using authority to gain compliance. Most humans obey authority instinctively. That instinct gets reinforced throughout their lives by parents, teachers, police officers, and even doctors.<\/p>\n<p>However, scammers can \u201cborrow\u201d this authority to achieve the same type of compliance from people and trick them into giving up money or personal information. For example, a scammer might pose as a technical support professional from Apple, claim the target\u2019s computer was hacked, and ask them to install a \u201csecurity\u201d package that gives the attacker remote access to the machine. Tech support schemes like this one have been around for a while and don\u2019t require hacking skills. However, criminals can also pose as other types of authorities like health officials, IRS officials, or private investigators.<\/p>\n<p>While there are other vulnerabilities, we\u2019ll save covering those for another day. Instead, it\u2019s important to understand the different ways criminals launch their attacks.<\/p>\n<h3>Types of social engineering attacks<\/h3>\n<p>The most common social engineering attacks occur via email. Phishing schemes involve sending out bulk email attempting to lure recipients into giving up personal information. Spear-phishing involves a more targeted approach. Criminals perform reconnaissance against a high-value target like an executive, then craft extremely convincing emails based on the intelligence they\u2019ve gathered.<\/p>\n<p>Both attacks occur over email. However, social engineering attacks don\u2019t stop with the inbox. Here are a few other common attacks:<\/p>\n<h4>VISHING<\/h4>\n<p>Voice phishing, or vishing for short, refers to phone phishing. Vishing is an easy method for scammers to make money because it\u2019s easy to forge caller ID and use automated messages. In general, most people have become used to companies using automated voice messages, so scammers can take advantage of this. Plus, once someone answers, the scammer can get on the phone and guide the victim toward the desired outcome.<\/p>\n<p>A common example might include someone using an automated voice system and dialer to call people from a fake caller ID (which helps conceal the scammers) claiming the victim has been hacked. Once the recipient responds, a human can get on the line and try to get them to install or remote access tools, giving the scammer control over the victim\u2019s computer.<\/p>\n<h4>SMISHING<\/h4>\n<p>As texting has become more common, criminals have shifted toward using SMS messages to phish people (this is called smishing). People may receive a message like, \u201cYour bank account has been compromised. Please click the link to unlock your account.\u201d Once that occurs, the victim goes to the site and enters their bank credentials, which scammers then use to steal funds.<\/p>\n<p>Smishing attacks aren\u2019t as widespread as email phishing, but they\u2019re becoming more common. In fact,\u00a0<a class=\"ext\" href=\"https:\/\/www.csoonline.com\/article\/3538831\/what-is-smishing-how-phishing-via-text-message-works.html\" target=\"_blank\" rel=\"noopener noreferrer\">some reports<\/a>\u00a0claim 15% of enterprise users have received a smishing message. It\u2019s important to make customers aware of the dangers of clicking unsolicited links in their text messages.<\/p>\n<h4>SOCIAL MEDIA PHISHING<\/h4>\n<p>Ultimately, if there\u2019s an easily usable communication method, criminals will find a way to weaponize it as a phishing tool. Social media is no exception. Creating false social media profiles can be an easy method of tricking people into giving up important information. A criminal may attempt to impersonate a friend by using their photos and name and ask for money via a link. Plus, people often have their guards down when using social media\u2014especially on mobile\u2014when compared to using work email.<\/p>\n<h4>BAITING<\/h4>\n<p>Baiting plays on people\u2019s natural curiosity to get them to perform an action. Most commonly, this refers to someone leaving a piece of physical media like a USB drive lying around in plain view, assuming a passerby will then plug it into their computer to examine the contents. However, these USB drives often contain malware and start the process of compromising a system or a network.<\/p>\n<h4>TAILGATING<\/h4>\n<p>Another social engineering attack that occurs outside of cyberspace, tailgating refers to the practice of trying to enter an unauthorized physical area. One common method involves a criminal trying to get into a company\u2019s building by asking an employee to hold the door for them and claiming they\u2019ve forgotten their badge or key. This preys on people\u2019s manners but can lead to employees letting malicious actors in just long enough for them to cause damage to the network.<\/p>\n<h4>PROTECTION AGAINST SOCIAL ENGINEERING<\/h4>\n<p>Social engineering requires strengthening the human element of security. Odds are good you already offer some form of user security training to keep users from falling victim. If you do, make sure your training goes beyond covering email threats like spam, attachments, and phishing to ensure customers also know to be careful on other channels like text or social media. Additionally, make sure your training reminds people to avoid using unknown physical media like USBs, CDs, or DVDs and to think twice before letting someone in the building. Also, consider providing frequent refreshers so people stay vigilant.<\/p>\n<p>Another important thing to remember is social engineering is typically only one piece of a larger attack. For this reason, having other layers of security in place can make a major difference in your customers\u2019 security postures. This means keeping up with patching, running frequent backups, and installing endpoint protection on devices.<\/p>\n<p>SolarWinds<sup>\u00ae<\/sup>\u00a0RMM offers patch management, integrated backup, web protection, and email protection. You can also run advanced endpoint protection via SolarWinds\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Endpoint Detection and Response (EDR)<\/a>, powered by SentinelOne, alongside SolarWinds RMM to discover and fight back against advanced threats at the endpoint level. Learn more about both SolarWinds EDR and\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/\" target=\"_blank\" rel=\"noopener\">SolarWinds RMM today<\/a>.<\/p>\n<p><em>Jay Pitzer is Senior Manager, Product Marketing at SolarWinds MSP<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.<\/p>\n","protected":false},"author":52,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6093","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Social Engineering Beyond the Inbox - N-able<\/title>\n<meta name=\"description\" content=\"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Engineering Beyond the Inbox - N-able\" \/>\n<meta property=\"og:description\" content=\"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-16T23:04:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-08T23:08:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jay Pitzer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Pitzer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\"},\"author\":{\"name\":\"Jay Pitzer\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b\"},\"headline\":\"Social Engineering Beyond the Inbox\",\"datePublished\":\"2020-06-17T00:04:37+01:00\",\"dateModified\":\"2021-04-08T23:08:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\"},\"wordCount\":1063,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\",\"name\":\"Social Engineering Beyond the Inbox - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-06-17T00:04:37+01:00\",\"dateModified\":\"2021-04-08T23:08:05+00:00\",\"description\":\"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering Beyond the Inbox\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b\",\"name\":\"Jay Pitzer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g\",\"caption\":\"Jay Pitzer\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Social Engineering Beyond the Inbox - N-able","description":"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox","og_locale":"fr_FR","og_type":"article","og_title":"Social Engineering Beyond the Inbox - N-able","og_description":"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-06-16T23:04:37+00:00","article_modified_time":"2021-04-08T23:08:05+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Jay Pitzer","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Jay Pitzer","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox"},"author":{"name":"Jay Pitzer","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b"},"headline":"Social Engineering Beyond the Inbox","datePublished":"2020-06-17T00:04:37+01:00","dateModified":"2021-04-08T23:08:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox"},"wordCount":1063,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox","url":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox","name":"Social Engineering Beyond the Inbox - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-06-17T00:04:37+01:00","dateModified":"2021-04-08T23:08:05+00:00","description":"Although email is one of the most used vectors of cyberattacks, we look at other ways cybercriminals get their fingers on your assets.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/social-engineering-beyond-the-inbox#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Social Engineering Beyond the Inbox"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/c935dab1264ef8e9106daee3bab0d96b","name":"Jay Pitzer","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d26247cb6d9454970dea1c1918ffd24ce57d3ce4bc88344b579f96cb0a6b3fb?s=96&d=mm&r=g","caption":"Jay Pitzer"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6093"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6093\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}