Jun 12, 2024
9 min read

Expert Corner: What Is Social Engineering Fraud and Why Is It on the Rise in 2024?

Rozy Setia, a Financial Crime Consultant at Ernst & Young Financial Services, discussed social engineering fraud for The Sumsuber Expert Corner.

Fraud has become a significant concern in today’s digital world, posing a constant threat to personal information and financial systems. Recent data from the Federal Trade Commission reveals a stark increase in both the number of victims and the financial toll of fraud. In 2023 alone, 2.6 million consumers reported falling victim to fraudulent activities, with reported losses exceeding $10 billion.

Interpol, in its turn, reports a high prevalence of romance fraud and advanced payment fraud in the following regions:

Source: Interpol

Most often, these types of fraud are a consequence of social engineering.

According to IBM’s 2023 Cost of a Data Breach report, data breaches initiated through social engineering techniques cost over $4.5 million on average.

According to Statista, in 2022, 30% of adults worldwide encountered phishing scams. In the same year, Vietnam had the largest share of internet users facing phishing attacks, and in the fourth quarter of 2022, there were over 1.35 million unique phishing sites worldwide.

Social engineering fraud, also known as “social engineering attacks” or “social engineering scams“, takes advantage of human emotions like fear, curiosity, or greed to deceive individuals or organizations into divulging sensitive information or performing actions that are detrimental to their interests.

Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems. It relies on manipulating individuals rather than hacking computer systems to penetrate a target’s account. Social engineering attacks can happen to an individual online or in person, with the most common being phishing.

As our digital footprints expand, fraudsters find more personal and financial information to exploit, posing significant risks if not adequately protected. The consequences of fraud extend beyond immediate financial losses, potentially affecting victims’ credit ratings, personal relationships, and mental health. Perpetrators often use social media and other online platforms to gather information about their targets, making their schemes more convincing. Both businesses and individuals have fallen victim to social engineering fraud, leading to financial losses, data breaches, and compromised security. As technology evolves, so do the methods of fraudsters, making it essential for everyone to stay informed and proactive in protecting themselves against social engineering attacks.

What is social engineering?

Social engineering refers to the manipulation of a target to elicit key information. In addition to stealing an individual’s identity or compromising a credit card or bank account, social engineering can be applied to obtain a company’s trade secrets or exploit national security.

For example, a woman might call a male victim’s bank, pretend to be his wife, claim an emergency, and request access to his account. If the woman can successfully socially engineer the bank’s customer service representative by appealing to the representative’s empathetic tendency, she may succeed in obtaining access to the man’s account and stealing his money. Similarly, an attacker might contact an email provider’s customer service department to obtain a password reset, making it possible for the attacker to control a target’s email account rather than hacking into that account.

Typical social engineering scheme

  1. Research: The fraudster conducts extensive research on their target, gathering information from various sources such as social media, company websites, or public records. This information helps them tailor their approach and gain the victim’s trust.
  2. Building trust: The fraudster establishes rapport with the victim through social interaction, often impersonating someone trustworthy or in a position of authority. They may use techniques like flattery, sympathy, or intimidation to manipulate the victim’s emotions.
  3. Creating a scenario: The fraudster fabricates a scenario or pretext to elicit the desired response from the victim. This could involve posing as a colleague, service provider, or authority figure and inventing a problem or urgent situation that requires immediate action from the victim.
  4. Exploiting trust: By exploiting the victim’s trust and emotions, the fraudster convinces them to take specific actions, such as sharing sensitive information, transferring money, or downloading malicious software. These actions serve the fraudster’s objectives, which could range from financial gain to accessing confidential data.
  5. Concealing identity: To avoid detection, the fraudster often conceals their true identity or impersonates someone else during the interaction. They may use spoofed email addresses, phone numbers, or social media profiles to make their communications appear legitimate.

Social engineering tactics

Attackers often use surprisingly simple tactics in social engineering schemes, such as asking people for help. Another tactic is to exploit disaster victims by asking them to provide personally identifiable information such as maiden names, addresses, dates of birth, and social security numbers for missing or deceased loved ones. Why? Because these pieces of information can later be used for identity theft.

Posing as a technical support professional or a delivery person is an easy way to gain unauthorized access to an account, as is sending a seemingly legitimate email with a malicious attachment. Such emails are often sent to a work email address where people are less likely to be suspicious of an unknown sender.

Emails can be disguised to appear as though they have originated from a known sender when they are actually sent by a hacker. More elaborate tactics targeted at specific people might involve learning about their interests and then sending the target a link related to that interest. The link can contain malicious code that can steal personal information from their computers. Popular social engineering techniques include phishing, catfishing, tailgating, and baiting.

Phishing is an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information, or other important data in order to utilize or sell the stolen information. Phishing and pretexting are prevalent forms of social engineering fraud, where perpetrators send deceptive messages or create false scenarios to trick victims into providing sensitive information.

Catfishing is when a person takes information and images, typically from other people, and uses them to create a new identity for themselves. In some cases, a catfisher steals another individual’s complete identity—including their image, date of birth, and geographical location—and pretends that it is their own.

Tailgating is a form of social engineering attack where an unauthorized individual breaches a company’s security system to physically access, steal, or compromise its data.

Baiting is a type of social engineering attack where a scammer uses a false promise to lure a victim into a trap that may steal personal and financial information or infect the system with malware. The trap could be in the form of a malicious attachment with an enticing name.

Emotional manipulation is another common tactic used by social engineers, who exploit fear, greed, curiosity, or sympathy to manipulate their victims into complying with their requests.

Types of social engineering fraud

Social engineering fraud can take various forms and exploit cultural nuances, technological vulnerabilities, and socio-economic factors unique to each region. Here are some common types of social engineering fraud prevalent globally:

Phishing: This is a widespread form of social engineering where attackers send deceptive emails or messages pretending to be from reputable organizations or individuals to trick recipients into revealing sensitive information such as passwords, credit card details, or personal information. Phishing attacks often target employees of multinational corporations, government agencies, or financial institutions.

Recently, Interpol announced that law enforcement agencies from 19 countries had significantly disrupted one of the world’s largest phishing-as-a-service platforms, LabHost. This platform was a major resource for cybercriminals globally, offering monthly subscriptions that included phishing kits, hosting infrastructure, interactive tools for victim engagement, and campaign management services. The investigation revealed at least 40,000 phishing domains associated with LabHost, which had approximately 10,000 users worldwide.

Online baiting: Online baiting occurs when hackers send out ads with links that look like opportunities to find jobs, earn side money, or provide useful information. When an unsuspecting person clicks on the bait, malware infects their computer.

Physical interactions: Social engineering attacks don’t just happen online. Physical interactions can occur, such as when an individual pretends to work in your office and asks you to let them in because they “forgot the door code or their card key” and need help.

Business Email Compromise (BEC): Also known as CEO fraud, this involves attackers impersonating high-level executives or business partners to deceive employees into making unauthorized transactions or disclosing sensitive information. Businesses, especially those with operations in multiple countries, are prime targets for BEC scams due to language barriers and communication complexities.

According to the SlashNext 2024 report, BEC attacks have increased by 29%. Some of the most prevalent types of BEC threats include gift card scams (21%), social engineering investment scams (16%), purchase renewal scams (14%), social engineering beneficiary scams (12%), and social engineering donation scams (10%).

Impersonation scams: Attackers impersonate trusted individuals, such as government officials, law enforcement officers, or tech support personnel, to manipulate victims into providing personal information or transferring money. These scams often exploit cultural norms and hierarchical structures to intimidate victims or gain their trust.

Ransomware: While not strictly social engineering, ransomware attacks often involve social engineering tactics to trick users into downloading malicious software. Ransomware attacks have targeted organizations across various sectors, including healthcare, finance, and government, leveraging social engineering techniques tailored to regional preferences and languages.

Voice phishing, or vishing: Attackers use phone calls or voice messages to impersonate trusted individuals or organizations and deceive victims into providing sensitive information or transferring funds. Vishing attacks may exploit linguistic diversity and dialects to appear more convincing to victims.

Real case 1: In 2019, criminals used AI-based software to impersonate a chief executive’s voice and demand a fraudulent transfer of €220,000 ($243,000).

Real case 2: In 2023, a 59-year-old woman lost Rs 1.4 lakh ($1.6K) to an AI voice scam. The caller skillfully emulated her nephew based in Canada and concocted a distressing story, asserting an urgent need for immediate financial aid.

Online romance fraud: Also known as romance scams, this type of social engineering fraud involves perpetrators creating fake personas on dating websites, social media platforms, or online forums to establish romantic relationships with unsuspecting individuals. Once trust is established, the fraudster exploits the victim’s emotions and goodwill to extort money or personal information.

Real case: Just recently, a Long Island woman lost more than $400,000 in a romance scam—and then was scammed again when she went looking online for help to get her money back.

Romance scams usually involve the following steps:

  1. Creating a fake profile: Scammers use stolen photos and false identities, often with attractive pictures and compelling backstories to lure victims.
  2. Building trust and emotional connection: Scammers engage with victims on messaging platforms or dating websites, quickly building emotional connections through flattery and romantic interest.
  3. Isolating the victim: Scammers isolate victims from friends and family to prevent warnings, discouraging them from discussing the relationship with others.
  4. Creating a crisis or urgent need: Once trust is established, scammers invent a crisis needing money, such as medical emergencies or travel expenses, using emotional manipulation to pressure the victim.
  5. Requesting money: Scammers request financial help through wire transfers, gift cards, or online payments, assuring repayment once the crisis is resolved.
  6. Disappearing act: After receiving money, scammers often cut off communication and move on to new targets, continuing the cycle of deception.

Online shopping scams: Scammers create fake e-commerce websites, apps, or ads offering heavily discounted products, but the purchased items are never delivered or are counterfeit or of poor quality.

Real case: Last year, a 70-year-old woman from Mumbai lost Rs 8.3 lakh ($9.9K) while shopping online. She was making a purchase of Rs 1,169 online; however, Rs 19,005 was debited from her account. She called the bank helpline number but later got duped for a total of Rs 8.3 lakh.

Tech support scams: Scammers pose as representatives from well-known tech companies, claiming to have detected issues with the victim’s device and offering to fix the problem in exchange for payment or remote access to the device.

Pig butchering scam: Also known as a “sha zhu pan” scam, this type of online investment fraud involves scammers creating fake online personas to lure victims into fraudulent investment schemes. The term “pig butchering” comes from the scammers’ practice of “fattening up” their victims by building trust over time before “slaughtering” them and stealing their money. These scams, which often originate overseas and involve cryptocurrency “investments,” have become a global problem, with several billions of dollars in reported losses worldwide.

Real case: Just this year, a man lost more than $500,000 after falling victim to an online scam known as “pig butchering”. She called herself Anna and connected with Barry May on Facebook, claiming to be an Asian woman living in New York. She convinced him to invest over $500,000 in cryptocurrency, promising they could be together and he would see huge returns, but it was all a scam. Just before he took out a loan to send more money, an FBI agent informed him that he was a victim of major fraud.

Preventing Social Engineering Attacks

Social engineering attacks are illegal, and some forms, such as identity theft or breaking into a government facility, are considered serious crimes. Employee training, robust authentication mechanisms, information security policies, technological defenses, incident response plans, vendor and partner security, cultural measures, physical security, and regular audits and reviews are all critical components of a comprehensive security program.

To effectively protect against social engineering tactics, companies should regularly introduce the following practices:

  • Access controls and data classification: Ensure that sensitive information is only available to those who need it.
  • Advanced email filtering: Use advanced email filtering solutions and deploy comprehensive anti-malware and anti-virus software. Regular software updates are also necessary to protect against vulnerabilities.
  • Incident response: Implement a detailed incident response plan and conduct regular drills to ensure all employees know their roles and responsibilities.
  • Customer Due Diligence and business verification: Perform thorough due diligence on vendors and partners and use secure communication channels.
  • Physical security measures: Encourage skepticism among employees and implement physical security measures, such as access controls and visitor protocols.
  • Audits: Conduct regular audits and policy reviews to stay on top of evolving threats.
  • Two-Factor Authentication (2FA): Use two-factor authentication, employ fake or difficult-to-guess answers to account security questions, and monitor accounts closely, especially financial ones.
  • Spam filters: Set spam filters to high to keep out unwanted messages, and never open attachments without careful consideration of their contents. Pay close attention to any suspicious or unusual emails, even if they appear to come from a known person or business.
  • Awareness and education: Educate yourself about common social engineering tactics such as phishing emails, phone scams, and pretexting. Avoid giving out confidential information, be cautious when sharing information on social media, and do not reuse passwords for different accounts. Stay informed about the latest scams and techniques used by fraudsters.

Conclusion

The sophistication of social engineering attacks is increasing, making robust preventive measures essential. Adopting a proactive approach that emphasizes education and awareness is crucial for individuals and organizations to recognize and respond to potential threats. Regular training sessions, simulated attacks, and up-to-date information on the latest tactics can fortify human defenses against such manipulation.

In addition to human defenses, implementing stringent security policies, employing multi-factor authentication, and maintaining regular system updates are crucial technical defenses. However, the human element remains the most vulnerable link in the security chain. Therefore, fostering a culture of vigilance and skepticism is essential.

To combat social engineering fraud, a dual approach is necessary: enhancing both technological defenses and human awareness. As attackers continue to refine their methods, continuous education and adaptability will be key to safeguarding sensitive information and maintaining trust in the digital realm. Stay informed and stay vigilant.

Fraud PreventionPartners columnSocial Media