Back to articles
How Fraudsters Exploit Social Engineering Online.

How Fraudsters Exploit Social Engineering Online.

via Dev.toJames Smith

A technical analysis of the psychology, automation, and detection details of attacks of online manipulation. In September 2023, a Slack message was received by a security engineer with a large US-based technology company because someone claiming to be a coworker in the IT department sent it to the individual. The message mentioned a real internal system by name, used the right internal vocabulary, and was delivered at 4:47 PM on a Friday, when attention is the lowest and the need to finalize things before the weekend is the greatest. The notification requested the engineer to authorize a regular MFA reset on a locked-out colleague. The engineer approved it. In forty minutes, the attacker had moved through 3 internal systems and stolen source code on a private repository. The attacker had not decrypted even a single piece of cryptography. They had not taken advantage of a computer bug. They had just known human psychology too well to model it and to automate it at scale. This is social

Continue reading on Dev.to

Opens in a new tab

Read Full Article
2 views

Related Articles