Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Angriffstechniken Glossary

Social Engineering - Die Psychologie des Angriffs

Manipulating people rather than systems using psychological principles such as authority, urgency, and reciprocity. Tools: phishing (email), vishing (phone), smishing (SMS), pretexting, baiting. Unlike an insider threat, the attacker comes from outside the organization and uses deception to gain access. 91% of all cyberattacks begin with social engineering.

Social engineering is the most dangerous attack technique in practice—because it bypasses the most difficult part of an attack: technical security. People are more vulnerable than firewalls.

Psychological Attack Principles

6 Cialdini principles as weapons:

1. Authority

  • "I'm the CEO, I need this NOW"
  • IT support impersonation: "Microsoft Security Team"
  • Government agency impersonation: "Tax office, urgent tax audit"
  • Protection: Always verify identity (call back using a known number!)

2. Urgency / Time Pressure

  • "The account will be blocked in 2 hours!"
  • "Transfer the funds NOW—the boss is in a meeting"
  • Goal: To disable critical thinking
  • Protection: Pause + Follow standard procedures

3. Scarcity

  • "Only you can still solve this problem"
  • "The offer expires in 10 minutes"
  • Emotional: Fear of missing out (FOMO)

4. Reciprocity

  • "I helped you, now I need your access code"
  • Returning a favor is human nature—and it’s exploited!

5. Social Proof

  • "Everyone else in your department has already agreed"
  • "Your colleague Max has already given me the login credentials"
  • Validation by others = psychological safety anchor

6. Sympathy / Liking

  • Attacker builds trust beforehand (LinkedIn Research)
  • Shared hobbies, same school, mutual colleagues
  • The more likable = the less critical

Social Engineering Attack Types

PHISHING (Email)

  • Mass phishing: widely distributed, generic bait
  • Spear phishing: targeted, personalized (more dangerous!)
  • Whaling: CEO/CFO as the target (higher permissions!)

Recognition criteria:

  • Sender domain: support@m1crosoft.com (no "o," but a "1")
  • Hover link: shows a different URL than the displayed text
  • Time pressure: "Act now!", "Account locked"
  • Attachment: .exe, .js, .iso, encrypted ZIPs

VISHING (Voice/Phone)

  • IT support scam: "I'm from Microsoft, your PC is infected"
  • CEO fraud: Impersonation of the CEO via phone call
  • Deepfake vishing (2024): AI-generated voice of the CEO - Example: $243,000 transferred after AI call (Hong Kong 2024)
  • Call center fraud: Bank call, "Security Department"

SMISHING (SMS)

  • DHL/Amazon package delivery: "Please pay customs fees"
  • Bank SMS: "Your card has been blocked" + fake link
  • OTP hijacking: "Please confirm the code we sent you"

PRETEXTING

  • Creating a fabricated identity/story
  • Example: Attacker poses as an IT auditor
    • Schedules an appointment via email (fake domain)
    • Shows up at the office: "I need to check your workstation"
    • Downloads tool (keylogger) onto PC → gains full access
  • Slow build-up: Weeks or months before the attack

BAITING

  • USB drive in the company parking lot: "GEHAELTER_2026.xlsx"
  • 60% of people plug in found USB drives (IBM study)
  • Bait: free software, cracked games (full of malware)
  • Countermeasure: Disable USB ports (GPO/BIOS)

TAILGATING / PIGGYBACKING

  • Unauthorized access by following someone in
  • Classic scenario: Hands full with a coffee cup → someone holds the door
  • Protection: Mantraporting, security gates, awareness

Business Email Compromise (BEC) / CEO Fraud

Most dangerous social engineering attack.

CEO Fraud Process

Preparation (weeks):

  1. OSINT: LinkedIn → CEO name, travel plans (conferences!)
  2. Domain registration: c-eo@deutschebank-noreply.de (similar)
  3. Target: Identify CFO or accounting department

Attack: 4. Email from "CEO": "I’m at a conference, won’t be available" 5. "We have an urgent acquisition—transfer 250,000 EUR" 6. "Don’t talk to anyone else – NDA! Discretion is essential" 7. "Accountant confirmed: Account: DE89370400440532013000 – now!"

Escalation if questioned:

  • "Don’t you believe me? Then I’m disappointed in you"
  • Combination of authority and guilt induction

Global losses:

  • FBI IC3 2024: $2.9 billion in losses due to BEC
  • DACH region: Known cases ranging from €10,000 to €10 million

Protection:

  • Dual-control principle for amounts over €5,000 (policy!)
  • Phone confirmation to a KNOWN number
  • Do not call back numbers from the email!
  • Transaction limit for initial transfers to new accounts
  • DMARC/DKIM/SPF: Prevent spoofing of your own domain

Red Team Social Engineering Tests

What AWARE7 checks during SE tests:

Phishing Simulation (Email)

  • Industry-specific lures (tax refund, HR, IT support)
  • Measure click-through rate (Target: < 5%)
  • Credential harvesting test (Target: 0 credentials entered!)
  • Reporting rate (Target: > 60% of emails reported)

Vishing Test (Phone)

  • Call posing as "IT Support": Please provide username + password
  • Call posing as "Service Provider": "I need the Wi-Fi password"
  • Measurement: Who discloses information?

Physical Penetration Test (On-Site)

  • Tailgating test: Does the tester enter the office?
  • USB drop: Do employees insert found USB drives?
  • Dumpster diving: Internal information in the trash?
  • "Forgotten" laptop in the lobby: Is it turned in?

OSINT Assessment

  • What information about the company is publicly available?
  • LinkedIn: Employees, department structure, tools (tech stack)
  • XING: German companies are often very transparent
  • Job postings: reveal technologies in use
  • Shodan/Censys: Exposed systems = talking points for SE

Awareness Program Against Social Engineering

Procedural Controls (More Important Than Training!)

  • Dual-control principle: all payments over X EUR
  • Call-back policy: always verify identity (check own phone book entry!)
  • Escalation path: "I’m unsure" → who to ask?
  • Need-to-know: sensitive info only to authorized personnel
  • USB policy: private devices prohibited (enforce technically)
  • Clean Desk Policy: no passwords on Post-its

Security Awareness Training

  • Not a one-time event, but ongoing (annual = too infrequent)
  • Gamification: phishing simulation with immediate feedback
  • Positive reinforcement: reward reports (never punish!)
  • Real-world examples: showcase industry-relevant incidents

Technical Controls

  • DMARC/DKIM/SPF to prevent spoofing of your own domain
  • Email banner for external emails: [EXTERNAL] in subject line
  • MFA: even if credentials are compromised → no access
  • Anti-phishing solutions: URL rewriting, sandboxing

Reporting culture

  • "Blame-free reporting": no one is shamed
  • Simple reporting process: 1 click in Outlook (Phish Alert button)
  • Confirmation email: "Thank you for your report—we are investigating"
  • Metrics: Reporting rate is the most important KPI (higher = better)