Trace Id is missing

Feeding from the trust economy: social engineering fraud

A person silhouette made of code holding a mask and stepping out of a phone. They are followed by red bubbles representing threat actors.

In an increasingly online world, where trust is both a currency and a vulnerability, threat actors seek to manipulate human behavior and take advantage of people’s tendency to want to be helpful. In this infographic, we’ll explore social engineering including why threat actors value professional identities above all others while walking you through some of the ways they manipulate human nature to achieve their goals.

Social engineering and the criminal allure of phishing

Approximately 901 percent of phishing attacks involve social engineering tactics designed to manipulate victims—usually via email—into revealing sensitive information, clicking malicious links, or opening malicious files. Phishing attacks are cost-effective for attackers, adaptable to help evade prevention measures, and boast high success rates.

The levers of human behavior

Social engineering techniques tend to hinge on the attacker’s use of confidence and persuasion to convince their targets to take actions that would otherwise be out of character. Three effective levers are urgency, emotion, and habit.2 Urgency  No one wants to miss out on a time-sensitive opportunity or fail to meet an important deadline. The sense of urgency frequently can trick otherwise rational targets into handing over personal information.
Example: False urgency
Esign-Notification: Document for review and signature from DocuSign. Important message.
“The hallmark of a phishing email is the attachment of some type of time frame. They want to push you to make a decision in an abbreviated time.”
Jack Mott – Microsoft Threat Intelligence

Emotion

Emotional manipulation can give cyber attackers an upper hand, since humans are more likely to take risky actions in a heightened emotional state, especially if fear, guilt, or anger are involved.

 

Example: Emotional Manipulation

“The most effective lure I have ever seen was a very short email that said we have been contracted by your spouse to prepare your divorce papers. Click the link to download your copy.”
Sherrod DeGrippo – Microsoft Threat Intelligence

Habit

Criminals are keen observers of behavior, and they pay special attention to the kinds of habits and routines people perform “on autopilot,” without too much extra thought.

 

Example: Common habit

In a technique known as “quishing3,” scammers will pose as a credible company and ask you to scan a QR code in their email. For example, they may say that you need to scan the code because your payment from an invoice didn’t go through, or you need to reset your password.

“Threat actors adapt to the rhythms of business. They’re great at deploying lures that make sense in the context we normally receive them.”
Jack Mott – Microsoft Threat Intelligence

The boundary between an employee’s personal and professional persona can sometimes converge. An employee may use their work email for personal accounts they use for work. Threat actors sometimes try to take advantage of that by reaching out with the appearance of being one of these programs so as to gain access to an employee’s corporate information.

Diagram showing: loyalty programs, social media, delivery, ride-share, banking/investment, streaming. This diagram shows examples of how threat actors try to gain access to an employees corporate information
“In email phishing scams, cybercriminals check their “lures” for corporate email addresses. Personal webmail addresses aren’t worth their time. Work addresses are more valuable, so they’ll put more resources and focus with hands-on-keyboard to customizing attacks for those accounts.”
Jack Mott – Microsoft Threat Intelligence

The “long con”

Social engineering attacks are generally not quick. Social engineers tend to build trust with their victims over time using labor-intensive techniques that begin with research. The cycle for this type of manipulation might go like this:
  • Investigation: Engineers identify a target and gather background information, like potential points of entry or security protocols.
  • Infiltrate: The engineers focus on establishing trust with the target. They spin a story, hook the target, and take control of the interaction to steer it in a way that benefits the engineer.
  • Exploit: Social engineers obtain the target’s information over time. Typically, the target hands over this information willingly, and engineers may use this to their advantage to gain access to even more confidential information.
  • Disengage: A social engineer will bring the interaction to a natural end. A skilled engineer will do this without making the target feel suspicious at all

BEC attacks stand apart in the cybercrime industry for their emphasis on social engineering and the art of deception. Successful BEC attacks cost organizations hundreds of millions of dollars annually. In 2022, the Federal Bureau of Investigation (FBI) Internet Crime Complaint Center recorded adjusted losses of more than USD$2.7 billion for 21,832 BEC complaints filed.4

Top targets for BEC are executives and other senior leaders, finance managers, human resources staff with access to employee records like Social Security numbers, tax statements, or other personal identifiable information. New employees, perhaps less likely to verify unfamiliar email requests, are also targeted.

Nearly all forms of BEC attacks are on the rise. Common BEC attack types include:5

  • Direct Email Compromise (DEC): Compromised email accounts are used to socially engineer in-house or third-party accounting roles to wire funds to the attacker’s bank account or change payment information for an existing account.
  • Vendor Email Compromise (VEC): Social engineering of an existing supplier relationship by hijacking a payment-related email and impersonating company employees to convince a supplier to redirect outstanding payment to an illicit bank account.
  • False Invoice Scam: A mass social engineering scam that exploits well-known business brands to convince companies to pay fake invoices.
  • Attorney Impersonation: The exploitation of trusted relationships with large, well-known law firms to increase credibility with executives of small companies and start-ups to complete payment of outstanding invoices, particularly prior to significant events like initial public offerings. Payment redirection to an illicit bank account occurs once an agreement on payments terms is reached.
Octo Tempest
Octo Tempest is a financially motivated collective of native English-speaking threat actors known for launching wide-ranging campaigns that prominently feature adversary-in-the-middle (AiTM) techniques, social engineering, and SIM swapping capabilities.
Phishing scenario: User enters password, MFA, redirected; malicious proxy involved
Diamond Sleet
In August 2023, Diamond Sleet conducted a software supply chain compromise of German software provider JetBrains that compromised servers for software building, testing, and deployment processes. Because Diamond Sleet has successfully infiltrated build environments in the past, Microsoft assesses that this activity poses a particularly high risk to organizations who are affected.
Sangria Tempest6
Sangria Tempest, also known as FIN, is known for targeting the restaurant industry, stealing payment card data. One of their most effective lures involves an accusation of food poisoning, the details of which can be viewed upon the opening of a malicious attachment.

Sangria Tempest, who is primarily Eastern European, have used underground forums to recruit native English speakers, who are trained on how to call stores in the delivery of the email lure. The group has stolen tens of millions of payment card data through that process.

Midnight Blizzard
Midnight Blizzard is a Russia-based threat actor known to primarily target governments, diplomatic entities, non-government organizations (NGOs), and IT service providers primarily in the US and Europe.

Midnight Blizzard leverages Teams messages to send lures that attempt to steal credentials from a targeted organization by engaging a user and eliciting approval of multifactor authentication (MFA) prompts.

Did you know?
Microsoft’s threat actor naming strategy has shifted to a new naming taxonomy for threat actors drawing inspiration from weather-related themes.
List of Natural and Cyber Threats

While social engineering attacks can be sophisticated, there are things you can do to help prevent them.7 If you’re smart about your privacy and security, you can beat attackers at their own game.

First, instruct users to keep their personal accounts personal and not to blend them with work email or work-related tasks.

Also, be sure to enforce the use of MFA. Social engineers are typically seeking information like login credentials. By enabling MFA, even if an attacker gets your username and password, they still won’t be able to gain access to your accounts and personal information.8

Don’t open emails or attachments from suspicious sources. If a friend sends you a link that you need to click urgently, confirm with your friend whether the message was really from them. Pause and ask yourself if the sender is who they say they are before clicking anything.

Pause and verify

Be wary of offers that are too good to be true. You can’t win a sweepstakes you didn’t enter, and no foreign royalty is going to leave you a large amount of money. If it seems too tempting, do a quick search to determine if the offer is legitimate or a trap.

Don’t overshare online. Social engineers need their targets to trust them for their scams to work. If they can find your personal details from your social media profiles, they can use it to help make their scams seem more legitimate.

Secure your computers and devices. Use antivirus software, firewalls, and email filters. In case a threat does make its way to your device, you’ll have protection in place to help keep your information safe.

“When you get a questionable phone call or email, the key is to just slow down and verify. People make mistakes when they act too quickly, so it’s important to remind employees that they don’t have to react right away these kinds of situations.”
Jack Mott – Microsoft Threat Intelligence

Learn more on how to help protect your organization by watching The risk of trust: Social engineering threats and cyber defense.

Related articles

Expert advice on cybersecurity's three most persistent challenges

Principal Group Manager Justin Turner, Microsoft Security Research describes the three enduring challenges he’s seen throughout his cybersecurity career: configuration management, patching, and device visibility

Cybercrime-as-a-service (CaaS) drives 38% business email fraud increase

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about CaaS and how to help protect your organization.

Microsoft, Amazon, and international law enforcement unite to fight tech support fraud

See how Microsoft and Amazon joined forces for the first time ever to take down illegal tech support call centers across India.