A month in the life of a social engineer – part one
With hackers finding more ingenious ways to exploit human flaws, we get inside the planning stages of a social engineering attack


With social engineering set to plague 2022, understanding cyber criminals’ tactics, and the mistakes they make, might help us defend against their efforts. The second in our four-part series, published weekly, navigates the infiltration process and how criminals prey on our greatest weaknesses.
Once a master plan is formulated, the social engineer must find a way into their targeted system. The primary route of entry, of course, is a human being.
An attacker only needs to fool one person within your organisation to gain access to your core networks and sensitive data. They'll start with a pool of candidates, before whittling down this list, perhaps after first making contact to establish a basis of trust and learn who's most amenable to the lie and willing to unwittingly help out.
Smoking out weak links
The TalkTalk breach of 2015 demonstrated how attackers use social engineering to find easy targets. First, the stolen data delivered a pool of targets with TalkTalk accounts alongside detailed contact information. Then, when cold-calling potential victims, the attackers only tried to scam those who believed the story.
Businesses aren’t above being scammed in the same way. Former fraudster and We Fight Fraud founder Tony Sales tells IT Pro: "Social engineering's just a buzzword for lying. Some people understand what the lies are and are able to defend against them, and some people don't. We're seeing this happen to brands; it happened to Spar, and it impacted everyone in their supply chain."
The social engineer might start by choosing a particular department whose employees have access to a network through which you want to spread remote-access malware, explains Freeform Dynamics analyst Tony Lock. "If you can attack someone on the help desk, maybe customer support, who then gets attacked and compromised, it'll then trickle up to the line manager and the group manager, and then it gets up to the top."
Finance, IT and reception staff are common targets, and have the added bonus of being accustomed to dealing with urgent demands from outsiders every day. Workers within these departments are, therefore, unlikely to be overly suspicious when a new "client" tries to get to know them. If the attacker has experience of a particular department, it’ll also give them a head start in gaining trust.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"I understand what HR does within a corporate organisation and what its processes are," says Sales. In addition, he adds, HR staff deal with job applications, any one of which could be loaded with a backdoor that's set to install as soon as the "application" is opened.
Probing for holes
Insecure workplace tech helps in any breach, of course, and any competent social engineer will take that into account when selecting their target. A new recruit who's struggling with Windows updates on a decade-old computer will be valuable prey, for example.
Not much ingenuity is required to find flaws in a company's network. Firstly, the attacker might make a friendly, fraudulent call or two to IT to ask for advice on "updating my Windows 11", thereby confirming what operating system is being used. After that, they'd simply look up previous Microsoft patches. "You'd find out what's been fixed in older versions of Windows, then see if the same components are in Windows 10 and 11," says Kevin Curran, senior IEEE member and professor of cybersecurity at Ulster University.
Other perfectly above-board tools that social engineers may use at this stage include Shodan, which finds compromised IoT devices, and the flaw-detecting framework Metasploit. "The attackers could do a bit of probing and find out a department is running Apache 2.34, which they know has this certain flaw," Curran adds. "Then they'd use Metasploit to target it on the victim's machine."
Gathering Intelligence
The attacker's next step is to collect information about the person they plan to exploit. This will be infinitely useful in softening them up, gaining trust, and then exploiting that trust with a pretext, such as a phishing email laced with a backdoor. The idea is to prepare the ground so the email or call isn't suspicious at all, and to gather all the intelligence needed to craft a convincing and irresistible message.
Ambitious attackers approach this stage "like a marketing professional studying their target audience," says James Stanger, chief technology evangelist at IT education group at CompTIA. They'll use AI tools, data analytics and online stalking to get intimate knowledge of that person, including their devices, work roles and behaviour patterns, right down to when they have lunch.
Our human instinct to share and connect makes this easy for social engineers, suggests Sales. "My friends see me constantly beating on about this stuff on social media, but they still click video links they shouldn't, and they still share information they shouldn't. We all want to connect with the world and have a little story with it."
Sales is far from laying blame for criminal espionage at the feet of victims who are just trying to do their jobs. After all, social engineers will glean personal information from their victims one way or another, Lock concludes. "Machine learning mechanisms can troll and accumulate a huge swathe of information from social media, then do some analysis on that before anyone even looks at it."
In the next part of our series, we find out how social engineers exploit the trust of your best employees to break into a network or even bring down a supply chain.
Jane Hoskyn has been a journalist for over 25 years, with bylines in Men's Health, the Mail on Sunday, BBC Radio and more. In between freelancing, her roles have included features editor for Computeractive and technology editor for Broadcast, and she was named IPC Media Commissioning Editor of the Year for her work at Web User. Today, she specialises in writing features about user experience (UX), security and accessibility in B2B and consumer tech. You can follow Jane's personal Twitter account at @janeskyn.
-
Third time lucky? Microsoft finally begins roll-out of controversial Recall feature
News The Windows Recall feature has been plagued by setbacks and backlash from security professionals
By Emma Woollacott Published
-
The UK government wants quantum technology out of the lab and in the hands of enterprises
News The UK government has unveiled plans to invest £121 million in quantum computing projects in an effort to drive real-world applications and adoption rates.
By Emma Woollacott Published
-
Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack
Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list.
By Jane McCallion Published
-
LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know
News Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows.
By Solomon Klappholz Published
-
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
-
Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week
News Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets
By Richard Speed Published
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly Published
-
CISA: Phishing campaign targeting US federal agencies went undetected for months
News Threat actors used legitimate remote access software to maliciously target federal employees
By Rory Bathgate Published
-
Google Ads malvertising campaign prompts questions around Search security
News A leading security researcher has called into question why Google still allows malware links to top search results
By Rory Bathgate Published
-
Uber hacked via basic smishing attack
News The self-taught hacker impersonated an IT worker to gain an Uber employee's password, obtaining broad access to internal systems and posting taunting messages
By Rory Bathgate Published