On the anatomy of social engineering attacks

A literature-based dissection of successful attacks

Journal Article (2018)
Author(s)

Jan Willem Bullée (University of Twente)

Lorena Montoya (University of Twente)

Wolter Pieters (TU Delft - Safety and Security Science)

M. Junger (University of Twente)

P.H. Hartel (TU Delft - Cyber Security)

Copyright
© 2018 Jan Willem Hendrik Bullée, Lorena Montoya, W. Pieters, M. Junger, P.H. Hartel
DOI related publication
https://doi.org/10.1002/jip.1482
More Info
expand_more
Publication Year
2018
Language
English
Copyright
© 2018 Jan Willem Hendrik Bullée, Lorena Montoya, W. Pieters, M. Junger, P.H. Hartel
Pages (from-to)
20-45
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and target. For each attack step, persuasion principles were identified. The main findings are that (a) persuasion principles are often used in social engineering attacks, (b) authority (1 of the 6 persuasion principles) is used considerably more often than others, and (c) single-principle attack steps occur more often than multiple-principle ones. The social engineers identified in the scenarios more often used persuasion principles compared to other social influences. The scenario analysis illustrates how to exploit the human element in security. The findings support the view that security mechanisms should include not only technical but also social countermeasures.