Camelishing Social Engineering Tool
16-02-2024, 08:57
? S.E. Note. Classical social engineering.
• To carry out a successful attack, attackers need three components: time, perseverance and patience. Often, attacks using social engineering are carried out gradually and methodically — not only data about the right people are collected, but also so-called "social signals". This is done in order to gain trust and circumvent the target. For example, an attacker can convince the victim with whom the dialogue is being built that they are colleagues.
• One of the features of this approach is the recording of music that the company uses during calls, at the moment when the caller is waiting for an answer. The attacker first waits for such music, then records it, and then uses it to his advantage.
• Thus, when there is a direct dialogue with the victim, the attackers at some point say: "Wait a minute, there's a call on the other line." Then the victim hears familiar music and she has no doubt that the caller represents a certain company. In fact, this is just a competent psychological trick.
• There are a great many such methods and techniques. Pay attention to the material on hashtags: #SI #Profiling # Psychology.
16-02-2024, 08:57
20-01-2023, 13:49
22-02-2024, 07:21
There are no comments
Information
Users of Visitor are not allowed to comment this publication.