top of page
Abstract Structure

Social Engineering

Social engineering is the use of human manipulation and psychology to gain access to a facility, system or divulge information that can be used in coordination  with other cyber security strategies to breach a computer system or infrastructure. Social engineering  is utilized in a variety of approaches including:

​

  • Physical access to computer systems

  • Phone or technical support

  • Chat Support

  • Online, social media, social apps

​

Social engineering leverages public information, company events, social media posts, employee and vendor social media profiles, media and news releases, holidays and basic impersonation techniques. Once the social engineer or unauthorized person breaches the initial security, they are able to access critical systems, place physical devices on existing computer systems (such a USB thumb drive with malicious software) or learn important data for future attacks.

RedSeer Social Engineering Methods

RedSeer's social engineering operators employ the following techniques as part of our social engineering campaigns:​​

​

  • Phishing

  • Spear Phishing

  • Smishing (SMS Phishing)

  • Vishing (Voice Mail Phishing)

bottom of page