(630) 844-9434 info@trtechnologies.net

5 Examples of Social Engineering Attacks

In 2012, a Wal-Mart store manager in Canada received a phone call from a “manager in the headquarters of Wal-Mart in Bentonville, AK” about a possibility of winning a large government contract. During the course of this conversation, the “manager” took detailed notes of key corporate information from questions he was asking the Canadian store manager. Of this information the “manager” was able to obtain physical logistics such as the janitor contract, the cafeteria provider, staff schedules and pay periods. He was also able to obtain information on the computer systems in use at the store along with critical pieces of information about the types of security measures that were used. The problem is – THERE WAS NO MANAGER IN THE HEADQUARTERS AND THERE WAS NO GOVERNMENT CONTRACT. The call was part of competition run by DefCon. DefCon is a hacker convention where hackers show each other their newest and cutting edge hacking timps. The “manager” had managed to get the identity of a real manager in the headquarters of Wal-Mart and used this to play a game of ‘capture the flag’ where he was able to capture all items of significance on a checklist in this competition. Examples of Social Engineering This is all social engineering. So much is done technically to thwart attackers when it comes to securing a network, including using firewalls, desktop and server security software, etc., but the use of social engineering can completely circumvent all these protection methods when the inside of an organization can so easily and willingly give away all the information and ways to access it. The following are examples...