The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1002/jip.1482
|View full text |Cite
|
Sign up to set email alerts
|

On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks

Abstract: The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(11 citation statements)
references
References 50 publications
0
9
0
Order By: Relevance
“…A psychological assault aimed at misleading users to reveal sensitive information or conduct specific malicious activities unintentionally is classified as social engineering [49], [50]. The powerful social engineering technique, instant messages, or domain name system (DNS) spoofing processes is the phishing assault in which the attacker attempts to gain the attention of the user by using spoofed emails.…”
Section: ) Attack On Application Softwarementioning
confidence: 99%
“…A psychological assault aimed at misleading users to reveal sensitive information or conduct specific malicious activities unintentionally is classified as social engineering [49], [50]. The powerful social engineering technique, instant messages, or domain name system (DNS) spoofing processes is the phishing assault in which the attacker attempts to gain the attention of the user by using spoofed emails.…”
Section: ) Attack On Application Softwarementioning
confidence: 99%
“…Moreover, Rubell (2018) explained how hackers could turn fragments of publicly disclosed information into a useful picture about the organization, and the role of the target victim who works for that company. Bullée et al (2018) have extracted different scenarios of social engineering attacks from books written by hackers, proving that psychological manipulation, such as the persuasion principles discussed by Cialdini (2001), are often used in interactions between the offender and the target in each attack.…”
Section: User-oriented Cyber-attacksmentioning
confidence: 99%
“…More recently, Social Engineering (SE) has emerged as a popular cyber security threat that is often overlooked [1,2]. SE can be described as the psychological or emotional manipulation of people into performing actions or divulging confidential information [3]. The increase in SE can be attached to the advancement in mobile devices and social media platforms such as Facebook, WhatsApp, Twitter, Snapchat, etc.…”
Section: Introductionmentioning
confidence: 99%