The 2023 Verizon Data Breach Investigations Report reveals that 74% of breaches involve a human element. IBM’s Cost of a Data Breach 2023 attributes over 95% of data breaches to human error. The findings are clear: as technology advances, so do the methods used for cybercrime. The same tools that enable positive advancements and conveniences can also be exploited for malicious purposes. Some breaches result from simple errors, while others involve deliberate privilege misuse or stolen credentials. However, the tried-and-tested method of social engineering remains a top tactic for cybercriminals because, quite simply, it works.
What is Social Engineering?
Social engineering is the art of manipulating people into revealing confidential information. It exploits human psychology rather than computer systems. Making it highly effective.
People are naturally social creatures, susceptible to persuasion and manipulation, and cybercriminals are aware of this. They leverage these traits to gain unauthorised access to company systems, bypass security controls, or steal sensitive data from organisations across various industries. Think of scammers or con artists - it’s essentially the same concept.
Social Engineering Attacks in South Africa
In South Africa, social engineering tactics range from phishing emails and WhatsApp messages to social media scams, pretexting phone calls and impersonation strategies. The South African Banking Risk Information Centre (SABRIC) has reported a dramatic increase in social engineering attacks in recent years, affecting organisations nationwide. The financial impact on South African businesses is significant: in 2022 alone, businesses suffered an estimated loss of R2.2 billion due to such attacks, as highlighted by the Cybersecurity and Digital Forensics Institute. These attacks have damaging effects on company reputations, lead to a loss of customer trust, and are exceedingly costly.
Research indicates that in Africa, just over half of all security incidents (52%) involve social engineering. In more than a third (37%) of successful attacks, vulnerabilities are exploited. Alarmingly, in one out of ten incidents, fraudsters gain access to business resources by compromising credentials.
How to Spot a Social Engineering Attack
Fortunately, common sense is your best defence. If something seems suspicious or doesn’t feel right, it may be an attack. Look out for these common clues:
Do this: If you suspect that someone is trying to trick or fool you, stop communication immediately.
Understanding Emotional Triggers
Cyber attackers often use various technologies or platforms to try to deceive us, such as email, phone calls, text messaging, or social media. While this can seem overwhelming, most of these attacks share one common factor: they play on our emotions.
We’ve already mentioned urgency, but emotions like anger and surprise can also be powerful triggers. People are more likely to respond to messages that evoke strong feelings or touch on topics they are passionate about. Our natural curiosity can also be exploited. For instance, a cyber attacker might send you a message claiming that a package is undelivered, urging you to click on a link to learn more – even if you didn’t order anything online. Our curiosity can make us want to investigate, but there’s no package - only malicious intent behind that link.
Most importantly, attackers are skilled at using names or brands you trust to convince you to take an action. This is why so many phishing attacks use the names of banks, or other government agencies –trusted, well-known entities. That’s why it is crucial to double-check email addresses and websites to ensure they are legitimate.
Five ways to stay ahead of cyber criminals
Now that we know what to look out for, here are five ways you can protect yourself:
Stay Ahead of Cyber Criminals
By following these precautions, understanding the emotional triggers, and remaining vigilant, you can significantly reduce the risk of falling victim to social engineering attacks, regardless of the lure, technology, or platform used by bad actors.