Here are the most commonly used forms of social engineering attacks:
1. Phishing
Phishing is when an attacker sends fake emails or messages to trick users into revealing their passwords, credit card info or other sensitive details.
2. Vishing
Vishing, or voice phishing, is when attackers make phone calls pretending to be someone trustworthy (like a bank representative or IT support) to trick victims into sharing sensitive information.
3. Smishing
Smishing is phishing done through SMS. Attackers send text messages with links to get users to act quickly.
4. Baiting
In a baiting attack, attackers offer something tempting to lure the user into making a mistake. A baiting example can be an attacker distributing free USB drives designed to install malware.
5. Pretexting
In pretexting, the attacker creates a fake scenario (the "pretext") to gain the target’s trust and extract information.
6. Tailgating
Tailgating happens when an attacker follows an authorized person into a restricted area without permission.
7. Pretexting vs phishing
Pretexting and phishing seem similar, but it’s important to understand how they differ.
Phishing usually casts a wide net. Attackers send out fake messages with the hope that someone will fall for the trick. Pretexting, on the other hand, is more targeted; attackers build a highly believable and personalized backstory to gain the victim’s trust over time.
In a sentence: phishing is about tricking people fast, whereas pretexting is more about patience and social skill.