{"id":240721,"date":"2023-04-02T12:14:38","date_gmt":"2023-04-02T09:14:38","guid":{"rendered":"https:\/\/shop.thekernel.ua\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering"},"modified":"2023-04-19T12:59:23","modified_gmt":"2023-04-19T09:59:23","slug":"how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering","status":"publish","type":"post","link":"https:\/\/shop.thekernel.ua\/en\/how-to-protect-yourself-and-colleagues-from-convincing-specialists-in-social-engineering","title":{"rendered":"How to protect yourself and colleagues from persuasive social engineering \u201cspecialists\u201d"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.20.2&#8243; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image7.png&#8221; parallax=&#8221;on&#8221; min_height=&#8221;610px&#8221; custom_margin=&#8221;-160px||-3px||false|false&#8221; custom_padding=&#8221;37px||22px|||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.20.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width_tablet=&#8221;&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|desktop&#8221; custom_margin=&#8221;|auto|0px|auto|false|false&#8221; custom_padding=&#8221;62px||0px||false|false&#8221; custom_padding_tablet=&#8221;0px||||false|false&#8221; custom_padding_phone=&#8221;10px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_font=&#8221;|900|||||||&#8221; text_text_color=&#8221;#ffffff&#8221; text_font_size=&#8221;65px&#8221; text_letter_spacing=&#8221;2px&#8221; text_line_height=&#8221;1.8em&#8221; header_font=&#8221;|800|||||||&#8221; header_text_color=&#8221;#ffffff&#8221; header_font_size=&#8221;65px&#8221; header_letter_spacing=&#8221;2px&#8221; header_line_height=&#8221;1.8em&#8221; text_orientation=&#8221;center&#8221; custom_margin=&#8221;45px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;off|desktop&#8221; text_font_size_tablet=&#8221;49px&#8221; text_font_size_phone=&#8221;38px&#8221; text_font_size_last_edited=&#8221;on|tablet&#8221; text_line_height_tablet=&#8221;1.8em&#8221; text_line_height_phone=&#8221;1.8em&#8221; text_line_height_last_edited=&#8221;on|desktop&#8221; header_font_size_tablet=&#8221;&#8221; header_font_size_phone=&#8221;38px&#8221; header_font_size_last_edited=&#8221;on|desktop&#8221; text_text_shadow_style=&#8221;preset1&#8243; header_text_shadow_style=&#8221;preset1&#8243; text_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1><b>How to protect yourself and colleagues from persuasive social engineering \u201cspecialists\u201d<\/b><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;|0px||0px|false|false&#8221; custom_padding=&#8221;|0px||0px|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; width_tablet=&#8221;91%&#8221; width_phone=&#8221;92%&#8221; width_last_edited=&#8221;on|tablet&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_font=&#8221;Roboto||||||||&#8221; text_text_color=&#8221;#333333&#8243; text_font_size=&#8221;18px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">How could it be that Olena downloaded the virus, believing that by following the link she would receive a brand new iPhone as a gift? Did Oleksiy do better than Elena by inserting a pretty flash drive with an interesting logo that he had just found in a cafe into his work computer? Both became victims of social engineering. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.1&#8243; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">You have probably heard more than once about how people reveal their bank card details, passphrases, PIN codes and passwords to fraudsters. Back in 2019, according to the Ukrainian Interbank Association of members of payment systems \u201cEMA\u201d, fraudsters stole more than UAH 360 million from bank cards using social engineering methods.<\/span><\/p>\n<h2><b>What is social engineering<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">In general, social engineering is a science that studies human behavior and factors (circumstances, environment, personal value system) that can influence it. But this term is widely used among information security specialists in the sense of psychological manipulation, which is carried out by fraudsters in order to obtain confidential information from network users (or company employees). <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Such fraudsters are often called \u201cspecialists\u201d in social engineering. <\/span><i><span style=\"font-weight: 400;\">It is not for nothing that we put the word \u201cspecialists\u201d in quotation marks, because the context of the word here is not at all positive. <\/span><\/i><span style=\"font-weight: 400;\">We must admit that their manipulations work well \u2013 in 65% of cases, fraudsters achieve their goals where the system is reliably protected by hardware methods. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The human factor becomes a weak link in it, because a person has feelings and is prone to emotional states, unlike technology. So, under certain circumstances, a person can disclose information even to strangers, trusting them for some reason. <\/span>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image7.png&#8221; alt=&#8221;image7&#8243; title_text=&#8221;image7&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><b>Methods used by fraudsters to obtain information<\/b><\/h2>\n<hr>\n<p><span style=\"font-weight: 400;\">To obtain information, fraudsters primarily use such human weaknesses as fear, curiosity, inattention, inexperience. If the attackers have an advanced level and more far-reaching goals, they try to make friends with the victim, gain trust by communicating with them for some time. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The methods by which criminals obtain the information they need are called:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pretexting (pretext).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Phishing (email phishing or phone phishing).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Road apple.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Shoulder surfing.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quid pro quo (service for service).<\/span><\/li>\n<\/ul>\n<h3><b>Pretexting <\/b><\/h3>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image6.png&#8221; alt=&#8221;image6&#8243; title_text=&#8221;image6&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">The essence of this method is that the victim performs actions that the attackers push him to do according to a previously developed script. This can be the disclosure of some data, or the download of malicious software. To develop a suitable scenario, fraudsters first track down the victim, collect data about him and the company he works for: full name, date of birth, position, department name, name of projects he works with, name of employees, etc. The attacker tries to find out about the missing elements through the social network (for example, by hacking the accounts of friends in social networks).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having obtained the necessary information, the fraudster can impersonate another person, already communicating with the head of the unit. Having collected data about the middle manager, he already turns to his supervisor. And so he acts until he gains access to the bank accounts of the company or hacks the account of the super administrator on the site.<\/span><\/p>\n<h3><b>Phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing can vary according to the method of communication: written (97%), spoken (2%) or a combination of them (1%). <\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image2-1.png&#8221; alt=&#8221;image2&#8243; title_text=&#8221;image2&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4><b>Phishing in correspondence<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Email is the most common type of phishing. It is based on sending the victim an SMS notification or a letter to the mail with malicious software or a fake site with a data entry form. To identify a fake site, you need to pay attention to its address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order for the user to open the message and follow the link, the attacker fakes it as an appeal from banks, government agencies, security services, police, volunteer organizations, etc.<\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image3.png&#8221; alt=&#8221;image3&#8243; title_text=&#8221;image3&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em><span style=\"font-weight: 400;\">An example of a fake page, the address of which differs by one letter and has an additional level of the \u201cin\u201d domain.<\/span><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">Key phrases that Internet users respond to more often:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">&#8220;Your financial accounts are blocked, enter your card details to unlock.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cWe are collecting money for a drone (helmets, clothes, food), send a certain amount.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cCongratulations, as a regular customer of our supermarket, you have won a phone\/computer\/car\/apartment under our promotion.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cYour computer system is not protected, please update your antivirus.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cYour property documents have been removed from the registry, please upload them again.\u201d<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cAn error with the calculation of wages, for confirmation, send the data of the passport and bank card.\u201d<\/span><\/li>\n<\/ul>\n<h3><b>Phone phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phone phishing is even more dangerous than correspondence, because in this case it is easier for the fraudster to create conditions for urgent action, when the victim does not have time to think. And when a person is in a hurry, he often makes mistakes. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The topics that phone fraudsters cling to are similar to those we talked about in the previous paragraph, but other manipulations related to the need for an urgent solution may be added to them:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">relatives got into an accident;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">the man was detained by the police;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">your brother is in trouble due to heavy debts etc.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In addition, fraudsters use the &#8220;official call&#8221; method from banks, services or the police. They are presented by other persons and completely copy the style of official messages, so people usually believe them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are also cases when the victim is first sent a letter, and then additionally calls so that she is sure to open it and receive a \u201cTrojan horse\u201d (malicious software under the pretext of downloading a supposedly safe file).<\/span><\/p>\n<h3><b>Road apple<\/b><\/h3>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image1.png&#8221; alt=&#8221;image1&#8243; title_text=&#8221;image1&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">This method is similar to a \u201cTrojan horse\u201d. Only it consists in the fact that a physical medium (flash drive) is thrown to the victim, which activates a ransomware virus or a spy virus. The media has a good look, official logos to attract attention. It seems that someone loses it in public places: in a caf\u00e9, a co-working space, in a parking lot, in a sports club, a room for workers to change clothes\/smoking, etc. And when a person inserts the find into a personal \/ work device, he gets troubles, such as: blocking of programs, changes in databases, theft of passwords.<\/span><\/p>\n<h3><b>Shoulder surfing<\/b><\/h3>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image5.png&#8221; alt=&#8221;image5&#8243; title_text=&#8221;image5&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">This method is not very simple and involves observing the victim in public places. And although everyone may think that they will be able to notice the person who is watching them in time, this is not always the case. Because attackers can work in a team, and one of them can distract the user&#8217;s attention, and the second can stand behind him. In this way, attackers can not only see the PIN code from the card (which a person enters at an ATM or at the checkout in a supermarket), but also spy on the two-factor authentication message code on the phone\/laptop screen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the second case, he works according to the following method: he receives the phone number of the victim, for example, in social networks. Then, while she&#8217;s standing somewhere in line, the scammer dials a password reset feature with a text message on her phone. Unsuspecting, a person takes out a phone, on the screen of which a message with a code appears. In this way, the attacker opens an account in social networks and gets access to all linked services.<\/span><\/p>\n<h3><b>Quid pro quo<\/b><\/h3>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2023\/03\/image4.png&#8221; alt=&#8221;image4&#8243; title_text=&#8221;image4&#8243; _builder_version=&#8221;4.20.2&#8243; _module_preset=&#8221;default&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;92%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.20.2&#8243; text_text_color=&#8221;#333&#8243; text_font_size=&#8221;16px&#8221; header_text_color=&#8221;#111&#8243; global_colors_info=&#8221;{}&#8221;]<span style=\"font-weight: 400;\">This method of attack involves creating such conditions that a person believes that he has serious problems. These can be issues related to bank accounts, insurance, equipment health, network access, etc. \u0417\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a \u043c\u043e\u0436\u0435 \u0434\u0437\u0432\u043e\u043d\u0438\u0442\u0438 \u043a\u0456\u043b\u044c\u043a\u0430 \u0440\u0430\u0437\u0456\u0432, \u043d\u0430\u0437\u0438\u0432\u0430\u044e\u0447\u0438\u0441\u044c \u0456\u043d\u0448\u043e\u044e \u043b\u044e\u0434\u0438\u043d\u043e\u044e \u0456 \u0437\u0430\u043f\u0438\u0442\u0443\u044e\u0447\u0438, \u0447\u0438 \u0432\u0441\u0435 \u0433\u0430\u0440\u0430\u0437\u0434, \u043f\u0440\u043e\u043f\u043e\u043d\u0443\u044e\u0447\u0438 \u0437\u0430\u043f\u043e\u0432\u043d\u0438\u0442\u0438 \u0430\u043d\u043a\u0435\u0442\u0443, \u043f\u043e\u0442\u0456\u043c \u0441\u0432\u043e\u0457 \u043f\u043e\u0441\u043b\u0443\u0433\u0438. \u041a\u043e\u043b\u0438 \u043b\u044e\u0434\u0438\u043d\u0430 \u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0435\u0440\u0435\u043a\u043e\u043d\u0430\u0454\u0442\u044c\u0441\u044f, \u0449\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0438 \u0454, \u0432\u043e\u043d\u0430 \u0437\u0432\u0435\u0440\u0442\u0430\u0454\u0442\u044c\u0441\u044f \u0434\u043e \u0437\u043b\u043e\u0432\u043c\u0438\u0441\u043d\u0438\u043a\u0430, \u044f\u043a\u0438\u0439 \u043a\u0430\u0436\u0435, \u0449\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u0438\u0440\u0456\u0448\u0443\u0454\u0442\u044c\u0441\u044f \u043b\u0435\u0433\u043a\u043e, \u043f\u043e\u0442\u0440\u0456\u0431\u043d\u043e \u043b\u0438\u0448\u0435 \u043d\u0430\u0434\u0430\u0442\u0438 \u0434\u0435\u044f\u043a\u0456 \u0434\u0430\u043d\u0456 \u0430\u0431\u043e \u0432\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0443. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">An example of dialogue in a large company, where specialists from different departments hardly cross each other.<\/span><\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">\u2013 Hello! I&#8217;m Andrii from the technical department. How can I contact you?<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2013 Hello! My name is Maksym. <\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 Nice to meet you. Have you ever had network problems?<\/span><br \/>\n<span style=\"font-weight: 400;\">&#8211; No, it&#8217;s okay. <\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 OK, and what is your computer number? <\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 \u0425\u0425\u0425\u0425\u0425123. And why do you ask?<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 The thing is that there is an emergency situation in the neighboring block, so they are warning about a long shutdown. Will it not be a problem for you to work for 2-3 days without the Internet?<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 What about you! I can last a couple of hours at most.<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 OK, then call my phone if you have any problems. \u041c\u043e\u0436\u0435\u043c\u043e \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u0443\u0432\u0430\u0442\u0438 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u0435 \u043f\u0456\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044f.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After that, the attacker calls the real technical department and says:<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 Greetings, I&#8217;m Maksym, could you turn off my computer XXXXXX123 for a couple of hours, I need to do some tests.<\/span><br \/>\n<span style=\"font-weight: 400;\">\u2014 No problem. <\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">After being without the Internet for an hour, Maksym usually starts calling \u201cAndrei\u201d to \u201chelp\u201d him solve the situation. In turn, \u201cAndriy\u201d sends Maksym alleged connection software, but in fact a \u201cTrojan horse\u201d. After that, he calls the technical department again and asks to connect the computer, because \u201ctesting is completed\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why did everyone believe \u201cAndrei\u201d in this situation? Because a technical specialist who can solve network issues is undeniably trustworthy. And for the technical department, the name of the employee and the name of the computer turned out to be enough factors not to check who is actually calling. Although the technicians could have asked more questions to the attacker (what testing, for what, do you need to send one of ours to you). And Maxim could ask his colleagues if they have similar problems with the network.<\/span><\/p>\n<h2><b>How to find out that social engineering methods are being applied to you<\/b><\/h2>\n<p><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">Recognizing malicious attacks can be difficult. Especially when you are multitasking and suddenly receive a message allegedly from a company or government service. But some nuances should alert you:<\/span><\/p>\n<ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The need for urgent confirmation of some personal data <\/b><span style=\"font-weight: 400;\">\u2014 usually enough time is allocated for any confirmation of the request so that the person can have time to collect information and prepare documents. Fraudsters deliberately put pressure on the victim to prevent them from thinking about their decision. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Request passwords, PIN codes, personal information, personal accounts, documents<\/b><span style=\"font-weight: 400;\"> \u2014 no service has the authority to make such requests. Even if the message says that certain documents are required to receive a salary, put the call on hold, call the accounting department, contact the administration and find out if they really sent you a letter. Or even ask colleagues if they have received similar requests.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Notification of a big win or receiving an inheritance from distant relatives from abroad <\/b><span style=\"font-weight: 400;\">\u2014 yes, that may be true, but it usually doesn&#8217;t require urgent tax payments on a voice-over-the-phone bill to get it. If it is about winning, then you will be asked to confirm the participant of the promotion \u2013 it can be numbers from a lottery ticket or a secret word under the lid, etc. If we are talking about inheritance, then most likely you will first receive an invitation to personally visit the relevant authority, taking with you the documents that will be listed in the sent list.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The interlocutor speaks the name, position, or company very quickly. <\/b><span style=\"font-weight: 400;\">If fraudsters have little information, they rely heavily on the inattention of the interlocutor, so they very quickly get to the point and deliberately speak some data unintelligibly (they can even create artificial interference on the network). It is enough to calmly ask the name, position, and name of the company so that the attacker will apologize and, under the pretext of calling back later, hang up. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>The need to send funds to an account number that must be entered manually<\/b><span style=\"font-weight: 400;\">, or through unfamiliar, dubious services on insecure sites. Usually, paying through quality stores or sending funds for assistance is done through official payment channels with one button (for example, through the Google Pay service), and not through online banking. And for this you do not need to manually dial the account number.<\/span><\/li>\n<\/ul>\n<\/ul>\n<h2><b>How to protect yourself from \u201cspecialists\u201d in social engineering<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">To protect yourself from the influence of fraudsters, we advise you to follow the recommendations of cybersecurity experts:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Try to be aware of social engineering techniques.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Include a critical attitude to any messages.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Put your calls on pause, so you can mull over the strange message.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not hesitate to ask the interlocutor the name, position, name of the department, company, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check the truth of the facts through additional channels of communication so that you cannot be intimidated or misled by bad news from relatives.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consult relatives, acquaintances before giving an answer regarding winnings or inheritance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check the sender&#8217;s data: whether there are no errors in the browser\/mail address, whether the phone number is different from the official one on the website.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If you are asked for money for help, transfer funds only through official services.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not pick up flash drives or insert them into the computer without prior verification by specialists.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Replace credit card payments with phone or smartwatch payment confirmation. Forget about entering PIN codes in public places.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check files for viruses before downloading them.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect your accounts with two-factor authentication. More about it in our article: \u201c<\/span><a href=\"https:\/\/shop.thekernel.ua\/dvofaktorna-avtentyfikatsiia\"><span style=\"font-weight: 400;\">Two-factor authentication<\/span><\/a><span style=\"font-weight: 400;\">\u201d.<\/span><\/li>\n<\/ul>\n<p><b>Separately, we highlight measures to protect employees of companies from intruders:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct regular cybersecurity training, especially for newcomers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Limit the rights of new users as much as possible. For example, prohibit downloading programs or using flash drives.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install reliable antivirus programs on every corporate computer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prohibit the use of credentials anywhere outside the company.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Develop a code of conduct in cases of confidential information requests.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prohibit the publication of personal data and contact information in public profiles of social networks (if the employee does not hold a relevant position that involves personal communication with clients, journalists, opinion leaders and does not engage in public work, etc.);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enter the use of technical means to protect accounts, such as: biometric scanners, smart cards, security keys.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All these methods are very effective, and their use will significantly help to avoid the negative influence of \u201cspecialists\u201d in social engineering. Of course, in order to provide more actionable recommendations, cybersecurity experts need to learn more about the specifics of your business, perform penetration tests, talk to your employees, and more. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you need to build a reliable security system for your company, contact our specialists. As professionals with 30 years of experience, we will help find system vulnerabilities and eliminate them, offer reliable cloud solutions so that you do not have to buy additional equipment, and recommend the most appropriate technical means of protecting employee accounts for the specifics of your business. <\/span><a href=\"https:\/\/shop.thekernel.ua\/en\/contacts\"><span style=\"font-weight: 400;\">Our contacts<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p style=\"text-align: center;\"><b>Don&#8217;t put off the security of your business for later. Contact us today!<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||-85px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_post_slider include_categories=&#8221;399&#8243; _builder_version=&#8221;4.17.1&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_image=&#8221;https:\/\/shop.thekernel.ua\/wp-content\/uploads\/2022\/04\/090f3141-scaled.jpg&#8221; custom_margin=&#8221;||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_post_slider][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to protect yourself and colleagues from persuasive social engineering \u201cspecialists\u201dHow could it be that Olena downloaded the virus, believing that by following the link she would receive a brand new iPhone as a gift? Did Oleksiy do better than Elena by inserting a pretty flash drive with an interesting logo that he had just [&hellip;]<\/p>\n","protected":false},"author":55,"featured_media":240726,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"none","_seopress_titles_title":"Methods of protection from specialists in social engineering","_seopress_titles_desc":"Why people reveal their bank card details, passphrases, PINs and passwords to fraudsters. We break down the methods of &quot;specialists&quot; in social engineering.","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[403],"tags":[],"class_list":["post-240721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles"],"acf":[],"_links":{"self":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/240721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/users\/55"}],"replies":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/comments?post=240721"}],"version-history":[{"count":12,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/240721\/revisions"}],"predecessor-version":[{"id":240840,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/posts\/240721\/revisions\/240840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media\/240726"}],"wp:attachment":[{"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/media?parent=240721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/categories?post=240721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shop.thekernel.ua\/en\/wp-json\/wp\/v2\/tags?post=240721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}