{"id":1460,"date":"2019-12-16T15:55:48","date_gmt":"2019-12-16T14:55:48","guid":{"rendered":"http:\/\/65.108.60.219\/?p=1460"},"modified":"2019-12-16T15:55:48","modified_gmt":"2019-12-16T14:55:48","slug":"social-engineering-techniques","status":"publish","type":"post","link":"https:\/\/cyberforces.com\/en\/social-engineering-techniques","title":{"rendered":"Social engineering techniques used by hackers"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\u201c<\/span><span style=\"font-weight: 400;\">If the door is locked, try the window\u201d <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> that\u2019s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace <\/span><span style=\"font-weight: 400;\">\u201c<\/span><span style=\"font-weight: 400;\">the door\u201d with \u201cthe system security\u201d and \u201cthe window\u201d <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> with employees. Today we will talk about techniques that hackers use to perform social engineering attacks.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What are the social engineering techniques, and why you should care about it at all?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Perhaps you think that hackers&#8217; attack doesn\u2019t threaten you. What&#8217;s more, if you run a business, you&#8217;ve probably already done a lot to protect it from cybercriminals. You&#8217;ve set strong passwords to your company\u2019s accounts. You&#8217;ve taken care of the high-quality source code of the website. You&#8217;ve invested in anti-virus software and access cards for your employees. Unfortunately, this is probably still not enough.<\/span><\/p>\n<p><b>Security systems are as strong as their weakest point<\/b> <span style=\"font-weight: 400;\">\u2014 <\/span><span style=\"font-weight: 400;\">no matter is it a weak firewall or John Doe, who clicked the link in an e-mail from the Nigerian prince.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Social engineering techniques are methods of manipulation, used to convince someone to take a specified action. It\u2019s not hard to figure out what actions suit cybercriminals. Giving login and password, allowing access to the building, downloading a virus file <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> examples can be multiplied. What they all have in common is that the hacker gets exactly what he wants: financial resources or confidential information belonging to the company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now you know what are social engineering techniques and why you have to defend your company against them. It\u2019s time to find out more about the methods used by hackers.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Social engineering types of attacks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Strategies that cybercriminals use can be divided into virtual, physical, and mixed (hybrid). We&#8217;ll look closer at each group one by one.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Virtual techniques: phishing, fake news and more<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">One of the most popular social engineering types of attack is <\/span><b>phishing<\/b><span style=\"font-weight: 400;\">. It is a non-personalized, usually mass attack, usually via fake emails or fake websites.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A variation of <\/span>phishin<span style=\"font-weight: 400;\">g is <strong>spear-phishing<\/strong>. It\u2019s an attack targeted at a specific person. A hacker selects a victim and then plans a strike taking into account their weaknesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let&#8217;s start with the combination of spear-phishing and the fake news method. Hacker makes a phone call to a person responsible for Public Relations and asks about a big scandal related to the company. The future victim, of course, doesn&#8217;t know about what scandal hacker is talking about, so hacker offers to send a link with the news to her e-mail. The article is, of course, fake, so as the whole website. After just a few seconds, on the page appears a pop-up with the link to the virus. The victim clicks to close it and download the virus straight to the computer. What&#8217;s more, if the victim sent the link to other people in the company \u2014 which is likely to happen \u2014 the virus will soon spread to the whole firm.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There is one more type of phishing \u2014 <\/span><b>whaling<\/b><span style=\"font-weight: 400;\">. In the case of whaling, a hacker targets his attack at high-level employees such as CEOs or CTOs. This choice isn&#8217;t incidental. People at the top of the office hierarchy, usually have full access to confidential data, interesting for hackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s worth to mention also about the <strong>deepfake<\/strong>, which is fake audio or video record. All a hacker needs to do is to use the software, which enables to create a digital representation of a voice, based on just a minute&#8217;s sample. After that, a hacker can use it, for example, to fake the company&#8217;s CEO and depute to make an urgent transfer from the company&#8217;s account. <\/span><span style=\"font-weight: 400;\">Deepfake is a relatively new, but a very serious threat.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Pretexting<\/strong> is &#8211; as the name suggests &#8211; an attempt to obtain sensitive data with a credible pretext. For example, a hacker may call a company as a bank&#8217;s consultant who is asking for confirmation before providing sensitive information. A worried employee who wants to find out what&#8217;s going on as soon as possible will give the criminal the data without a second thought.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Physical techniques<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">When it comes to hackers, many people imagine a man with a hood, sitting in a dark room, lit only by the brightness of a computer screen. This image, well known from newspapers, doesn&#8217;t truly reflect the reality. Hackers also work in the real world <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> with success.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To conduct an attack, hackers may <\/span><b>dress up<\/b><span style=\"font-weight: 400;\">, for example, as a maintainer who installs printer drivers. He will choose the ideal moment when no one in the office who can confirm whether a professional has been called in. The employee will provide the service technician with a computer to install the drivers and will receive malware as part of the package.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another method used in social engineering attacks is <\/span><b>baiting<\/b><span style=\"font-weight: 400;\">. The name comes from the word bait. The association with fishing isn&#8217;t accidental. Just as a fisherman hangs a worm on a rod to catch a fish, a hacker can drop an infected USB stick in the company.<\/span><\/p>\n<p><b>Tailgating<\/b><span style=\"font-weight: 400;\"> is gaining access to a given place by an unauthorized person. For example, an employee may hold a door for a rushing person. Tailgating usually takes place in large companies, where employees don&#8217;t know all their co-workers.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Mixed (hybrid) techniques<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The combination of virtual and physical methods is also popular in the world of the cybercriminal.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A few months ago, one of the well-known corporations found out about this. Firstly, the employees of the company received a 30% discount on the new pizzeria that opened up in the neighborhood. They were excited and quickly organized a Pizza Day at the office. The pizzeria delivered 8 pizza boxes and free USB drives with LED lamps \u2014 with a virus on it. The employees, of course, suspect nothing and immediately connected gifts to their computers, giving hackers remote access to them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately for the company, we were responsible for the attack \ud83d\ude42<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The whole action was a part of the security audit. If you are interested in the topic, you can read more in the article <\/span><a href=\"https:\/\/cyberforces.com\/en\/the-pizza-method-a-social-engineering-case-study\"><span style=\"font-weight: 400;\">The Pizza Method \u2013 a Social Engineering Case Study<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The six principles of persuasion by Cialdini<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Regardless of the method they choose, cybercriminals often use 6 rules presented in Robert Cialdini&#8217;s best-seller: &#8220;Influence: The Psychology of Persuasion&#8221;. To give you a better idea of how each of them works, we&#8217;ve prepared a table with the summary:<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Reciprocity<\/span><\/h3>\n<p><b>How does it work? <\/b><span style=\"font-weight: 400;\">When someone does something for us, we often feel obliged to return the favor.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">A hacker can set up a situation where he can help his victim, e.g., collect documents that fell out of her hands after he accidentally hit her (&#8220;I&#8217;m sorry, I&#8217;m so clumsy&#8230;&#8221;). Then, after gaining the victim&#8217;s trust, he will ask for what he wants \u2014 for example, entering the building (&#8220;I left the card in the office. It&#8217;s my first day, my boss can&#8217;t know about it&#8230;&#8221;).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Commitment and consistency<\/span><\/h3>\n<p><b>How does it work?<\/b><span style=\"font-weight: 400;\"> People like to think about themselves as consistent in their actions. When we&#8217;ve devoted a lot of time and energy to something, it&#8217;ll be much easier for us to do even more than when we didn&#8217;t.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">An employee who has already done one of the hackers&#8217; favor (e.g., let him enter the office) is likely to comply with another one (e.g., let him use a company computer).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Social proof<\/span><\/h3>\n<p><b>How does it work? <\/b><span style=\"font-weight: 400;\">When other people act in a certain way, it&#8217;s easier for us to believe that it&#8217;s right and to take the same actions.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">Do you remember the Pizza Day case? When employees of the unfortunate corporation have gotten infected USB drivers as a gift, it was enough that one of them plug it into a computer <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> the rest done the same without a second thought<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Liking<\/span><\/h3>\n<p><b>How does it work? <\/b><span style=\"font-weight: 400;\">When we like someone, we&#8217;re more likely to do what he asked.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">Let\u2019s go back to the example with a hacker pretending to be a new employee, which have forgotten access card and beg others of letting him enter the office (\u201cThat\u2019s my very first day, my boss can\u2019t find out this has happened!\u201d). The liking rule says that many people don\u2019t refuse to help a charming dummy.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Authority<\/span><\/h3>\n<p><b>How does it work? <\/b><span style=\"font-weight: 400;\">We are more willing to fulfill requests from people who in our opinion have power or authority.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">A cybercriminal may fake an important person in the company (by e-mail\/phone) or a respectable one \u2014 a firefighter, a police officer (using a costume).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Scarcity rule<\/span><\/h3>\n<p><b>How does it work?<\/b><span style=\"font-weight: 400;\"> We consider things that are rare or hard to achieve as more valuable.<\/span><\/p>\n<p><b>How hackers use it: <\/b><span style=\"font-weight: 400;\">Everyone, at least once, has been notified that he has just won a smartphone and needs to hurry to get it? That&#8217;s a great example of how hackers use the rule of scarcity.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How to protect a company against social engineering attacks?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Of course, the list of social engineering techniques used by hackers isn&#8217;t complete. Every year, new methods appear, as well as new viruses. The best strategy of defense against them remains a vigilance and common sense.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To protect yourself and your company against social engineering attacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Don&#8217;t do things automatically<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> get used to reading the link address before clicking it, checking the sender&#8217;s e-mail address carefully, comparing data on printed invoices with data from the electronic version, etc.,<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Make sure who you are dealing with<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> ask maintainers who come to the company to show their ID, don&#8217;t open the door to people without an access card, etc.;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Update your operating system and antivirus software regularly<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> also require it from employees working on their own devices (remotely);<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Ask yourself &#8220;Why?&#8221;<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> before you decide to fulfill a request made by a stranger, think about what is behind it. Is it reasonable? Is there a good reason to comply <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> and that, precisely, you should do it?<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Make sure you are speaking to whom you think you are<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> if you have doubts about the interlocutor, subtly put in the conversation a little lie that will quickly surprise the real person. Example? There you go. Imagine that you are answering a call from a contractor&#8217;s accounting department with a request to change the account number for transfers. You may ask, for example, if Mary has already returned from her maternity, knowing that no Mary works in the company;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Don&#8217;t be afraid to confirm information<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> sometimes you need only one phone call to ask about an e-mail request (e.g., change your account number on the invoice), and avoid a tragedy.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Make your employees aware of cybersecurity issues<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The fact that you are aware of a threat doesn&#8217;t mean that everyone in your company is. Hackers know this well and often target their attacks to employees without even basic knowledge about cybersecurity. No surprise <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> usually it&#8217;s easier to convince a receptionist for giving a stranger a pass data, than a board member to do so.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You want to aim for the situation when every employee of your company is aware of the dangers and knows how to defend himself against them. For a good start, you can drop off this article (e.g., in the internal newsletter).<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Run social engineering tests<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Words quickly escape from memory. Experiences, especially those connected with strong emotions, stay in humans&#8217; minds much longer. Can there be anything more memorable for an employee than discovering that it&#8217;s his fault that hackers managed a successful attack on the company?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How do such tests look like step by step?\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><b>We sign a data confidentiality agreement<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> We always take care of the security of the information we obtain during the &#8220;attack&#8221;, but also we want you to feel comfortable;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>We talk about your company<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> Every business is different. The conversation will help us to better understand the structure of your company, its core resources, and employees <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> and then fit the test to them;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>We set entry points<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> We look for gaps in your security system, using generally available sources (information about the company and employees on the Internet), verify attack vectors and their use;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>We develop a strategy<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> Together we prepare a test scenario, making sure it is as realistic as possible;<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>We test<\/b> <span style=\"font-weight: 400;\">\u2014 <\/span><span style=\"font-weight: 400;\">This is the moment we&#8217;ve been waiting for from the beginning. Now you will see if your employees are ready to resist the hacker attack. Our specialists carry out an established scenario, such as a burglary at your headquarters or a remote attack using spear-phishing.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>We suggest what&#8217;s next<\/b> <span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> After the test, you receive a report from us, which contains both information about the test itself (what resources we gained access to, what were the entry points) and our recommendations (which areas should be strengthened, how to develop protocols to deal with such situations). We also recommend training with employees so that they know how to deal with threats in the future.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">To sum up<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are many social engineering attacks scenarios (and new ones are still coming), but the main way to defend against them stays the same <\/span><span style=\"font-weight: 400;\">\u2014<\/span><span style=\"font-weight: 400;\"> it&#8217;s common sense.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Make sure that you and your employees don&#8217;t lose it. As we mentioned before, for a start, you can give them this article to read. If you feel it&#8217;s not enough (you&#8217;re probably right), consider performing <\/span><a href=\"https:\/\/cyberforces.com\/en?p=1013\"><span style=\"font-weight: 400;\">social engineering tests<\/span><\/a><span style=\"font-weight: 400;\"> in your company.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cIf the door is locked, try the window\u201d \u2014 that\u2019s the motto, used by more and more cybercriminals, unfortunately, successful. Just replace \u201cthe door\u201d with \u201cthe system security\u201d and \u201cthe window\u201d \u2014 with employees. Today we will talk about techniques that hackers use to perform social engineering attacks. What are the social engineering techniques, and [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":1455,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[29],"tags":[],"class_list":["post-1460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social engineering techniques used by hackers - TestArmy CyberForces<\/title>\n<meta name=\"description\" content=\"What social engineering techniques are used by hackers and how to protect your company from them? About this in today&#039;s article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social engineering techniques used by hackers\" \/>\n<meta property=\"og:description\" content=\"What social engineering techniques are used by hackers and how to protect your company from them? About this in today&#039;s article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\" \/>\n<meta property=\"og:site_name\" content=\"CyberForces\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-16T14:55:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Social-engineering-techniques-used-by-hackers.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Agnieszka_Polak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka_Polak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#article\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\"},\"author\":{\"name\":\"Agnieszka_Polak\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/ecb3fcbdae0e78b522d5e23c8a9eb30f\"},\"headline\":\"Social engineering techniques used by hackers\",\"datePublished\":\"2019-12-16T14:55:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\"},\"wordCount\":2282,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\",\"url\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\",\"name\":\"Social engineering techniques used by hackers - TestArmy CyberForces\",\"isPartOf\":{\"@id\":\"https:\/\/cyberforces.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr\",\"datePublished\":\"2019-12-16T14:55:48+00:00\",\"description\":\"What social engineering techniques are used by hackers and how to protect your company from them? About this in today's article.\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberforces.com\/en\/social-engineering-techniques\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr\",\"width\":1200,\"height\":628,\"caption\":\"socjotechniki stosowane przez haker\u00f3w\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberforces.com\/en\/social-engineering-techniques#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/cyberforces.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social engineering techniques used by hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberforces.com\/#website\",\"url\":\"https:\/\/cyberforces.com\/\",\"name\":\"CyberForces\",\"description\":\"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!\",\"publisher\":{\"@id\":\"https:\/\/cyberforces.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberforces.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberforces.com\/#organization\",\"name\":\"TestArmy Group S. A.\",\"url\":\"https:\/\/cyberforces.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png\",\"width\":1210,\"height\":173,\"caption\":\"TestArmy Group S. A.\"},\"image\":{\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TestArmyCyberForces\/\",\"https:\/\/www.linkedin.com\/company\/cyberforcescom\/\",\"https:\/\/www.instagram.com\/cyberforces__\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cyberforces.com\/#\/schema\/person\/ecb3fcbdae0e78b522d5e23c8a9eb30f\",\"name\":\"Agnieszka_Polak\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr\",\"url\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr\",\"contentUrl\":\"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr\",\"caption\":\"Agnieszka_Polak\"},\"description\":\"Content Marketing Specialist. Bardziej ni\u017c liczby, interesuj\u0105 mnie ludzie, kt\u00f3rzy za nimi stoj\u0105, dlatego na pierwszym miejscu stawiam nie KPI, ale to, \u017ceby tre\u015bci, kt\u00f3re tworz\u0119, by\u0142y interesuj\u0105ce i u\u017cyteczne.\",\"url\":\"https:\/\/cyberforces.com\/en\/author\/agnieszka_polak\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social engineering techniques used by hackers - TestArmy CyberForces","description":"What social engineering techniques are used by hackers and how to protect your company from them? About this in today's article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberforces.com\/en\/social-engineering-techniques","og_locale":"en_US","og_type":"article","og_title":"Social engineering techniques used by hackers","og_description":"What social engineering techniques are used by hackers and how to protect your company from them? About this in today's article.","og_url":"https:\/\/cyberforces.com\/en\/social-engineering-techniques","og_site_name":"CyberForces","article_publisher":"https:\/\/www.facebook.com\/TestArmyCyberForces\/","article_published_time":"2019-12-16T14:55:48+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Social-engineering-techniques-used-by-hackers.png","type":"image\/png"}],"author":"Agnieszka_Polak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka_Polak","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#article","isPartOf":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques"},"author":{"name":"Agnieszka_Polak","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/ecb3fcbdae0e78b522d5e23c8a9eb30f"},"headline":"Social engineering techniques used by hackers","datePublished":"2019-12-16T14:55:48+00:00","mainEntityOfPage":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques"},"wordCount":2282,"commentCount":0,"publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"image":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr","articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cyberforces.com\/en\/social-engineering-techniques#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques","url":"https:\/\/cyberforces.com\/en\/social-engineering-techniques","name":"Social engineering techniques used by hackers - TestArmy CyberForces","isPartOf":{"@id":"https:\/\/cyberforces.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage"},"image":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage"},"thumbnailUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr","datePublished":"2019-12-16T14:55:48+00:00","description":"What social engineering techniques are used by hackers and how to protect your company from them? About this in today's article.","breadcrumb":{"@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberforces.com\/en\/social-engineering-techniques"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#primaryimage","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/socjotechniki-uzywane-przez-hakerow.png?wsr","width":1200,"height":628,"caption":"socjotechniki stosowane przez haker\u00f3w"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberforces.com\/en\/social-engineering-techniques#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/cyberforces.com\/"},{"@type":"ListItem","position":2,"name":"Social engineering techniques used by hackers"}]},{"@type":"WebSite","@id":"https:\/\/cyberforces.com\/#website","url":"https:\/\/cyberforces.com\/","name":"CyberForces","description":"Testy bezpiecze\u0144stwa z TestArmy CyberForces. Testy penetracyjne, hackowanie aplikacji webowych i mobilnych, testy socjotechniczne. Dowiedz si\u0119 wi\u0119cej!","publisher":{"@id":"https:\/\/cyberforces.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberforces.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberforces.com\/#organization","name":"TestArmy Group S. A.","url":"https:\/\/cyberforces.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/CyberForces-logo.png","width":1210,"height":173,"caption":"TestArmy Group S. A."},"image":{"@id":"https:\/\/cyberforces.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TestArmyCyberForces\/","https:\/\/www.linkedin.com\/company\/cyberforcescom\/","https:\/\/www.instagram.com\/cyberforces__"]},{"@type":"Person","@id":"https:\/\/cyberforces.com\/#\/schema\/person\/ecb3fcbdae0e78b522d5e23c8a9eb30f","name":"Agnieszka_Polak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr","url":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr","contentUrl":"https:\/\/cyberforces.com\/wp-content\/uploads\/2019\/12\/Agnieszka-Polak-zdj_cie-100x100.png?wsr","caption":"Agnieszka_Polak"},"description":"Content Marketing Specialist. Bardziej ni\u017c liczby, interesuj\u0105 mnie ludzie, kt\u00f3rzy za nimi stoj\u0105, dlatego na pierwszym miejscu stawiam nie KPI, ale to, \u017ceby tre\u015bci, kt\u00f3re tworz\u0119, by\u0142y interesuj\u0105ce i u\u017cyteczne.","url":"https:\/\/cyberforces.com\/en\/author\/agnieszka_polak"}]}},"_links":{"self":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/comments?post=1460"}],"version-history":[{"count":4,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1460\/revisions"}],"predecessor-version":[{"id":1466,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/posts\/1460\/revisions\/1466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media\/1455"}],"wp:attachment":[{"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/media?parent=1460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/categories?post=1460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberforces.com\/en\/wp-json\/wp\/v2\/tags?post=1460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}