Skip to content

Social Engineering

Social Engineering & Phishing Attacks πŸŽ­πŸ”’

πŸ”Ή What is Social Engineering?

Social Engineering manipulates people into revealing confidential information through deception, urgency, and impersonation rather than hacking systems.


1️⃣ Types of Social Engineering Attacks

πŸ“§ Phishing (Email Scam)

Attackers send fake emails pretending to be from legitimate sources to steal login credentials, credit card details, or install malware.
βœ… Example: Fake PayPal email asking you to reset your password via a malicious link.
πŸ”Ή Prevention: Verify senders, avoid suspicious links, and use email security tools.

πŸ“ž Vishing (Voice Phishing – Phone Call Scam)

Scammers impersonate banks, government, or IT support over the phone to trick you into sharing sensitive details.
βœ… Example: "Your bank account is compromised! Share your OTP to secure it."
πŸ”Ή Prevention: Never share sensitive info over calls. Call back using official numbers.

πŸ“² Smishing (SMS Phishing – Text Scam)

Fake text messages with malicious links pretending to be from banks, delivery services, or government agencies.
βœ… Example: "Your Amazon order is on hold! Click here to confirm." (Fake login page)
πŸ”Ή Prevention: Don’t click links in suspicious messages. Verify with the official source.


2️⃣ Other Phishing Variants

🎯 Spear Phishing (Targeted Attack)

Customized phishing attack targeting individuals with personal details.
βœ… Example: Fake HR email asking you to update payroll info.

πŸ‹ Whaling (CEO Fraud)

Scammers impersonate executives to trick employees into wire transfers or sharing sensitive business data.
βœ… Example: Fake CEO email asking finance to send urgent payment.

πŸ”„ Clone Phishing

Attackers replicate legitimate emails but replace links with malicious ones.
βœ… Example: A duplicate security alert from Microsoft with a fake link.

🎣 Angler Phishing (Social Media Scam)

Fake social media profiles or messages with malicious links.
βœ… Example: A fake Amazon support message on Twitter asking for login details.

πŸ” Search Engine Phishing (SEO Poisoning)

Fake websites appear in top search results, tricking users into entering credentials.
βœ… Example: A fake "Zoom Download" site installing malware instead.

🌐 DNS Poisoning (Pharming Attack) πŸ΄β€β˜ οΈ

Attackers modify DNS records to redirect users from legitimate websites to malicious sites that steal data.
βœ… Example: You enter bank.com, but due to DNS poisoning, you're sent to a fake bank login page.
πŸ”Ή Prevention:
βœ” Use DNSSEC (DNS Security Extensions).
βœ” Clear DNS cache regularly.
βœ” Avoid public or unsecured DNS servers.


πŸ›‘οΈ How to Stay Safe?

βœ… Verify before clicking – Check links before opening.
βœ… Enable Multi-Factor Authentication (MFA) – Even if passwords leak, attackers can’t access accounts.
βœ… Use email & call security filters – Block suspicious emails and calls.
βœ… Never share sensitive details via email, SMS, or phone.
βœ… Use VPN on public Wi-Fi to avoid MitM attacks.
βœ… Report phishing attempts to IT security teams or anti-phishing organizations.