Select Page

For more information about bait and other forms of social engineering online, see www.cmu.edu/iso/aware/dont-take-the-bait/social-engineering.html As the name suggests, bait attacks use a false promise to arouse a victim`s greed or curiosity. They lure users into a trap that steals their personal data or equips their systems with malware. The second most common bait technique is the use of flash drives or USB sticks infected with malware. Once targeted employees insert these devices into the company`s computers, malware is automatically installed on their system and infects the corporate network. The most common form of bait uses physical media to spread malware. For example, attackers leave the lure of a malware-infected flash drive in flashy areas where potential victims are sure to see them. When the victim inserts the flash drive into a work or home computer, the malware is automatically installed on the system. Bait scams are also online in the form of enticing ads that lead to malicious websites or encourage users to download a malware-infected app. What is “hate speech”? Bait is to leave a portable storage medium such as a CD, laptop or USB stick in an open place to entice a victim to see what`s in it. When the victim opens files, they open on the media, run malware that releases a virus, or exposes personal and financial information to hackers. If the victim uses a network, the infection can spread throughout the network. For an employee of a large company, being deceived by a defamation attack can lead to massive problems for the entire organization. Each individual should learn to recognize the tricks of scammers and protect themselves from the prey of a bait attack.

Social engineers manipulate human feelings such as curiosity or fear to make plans and lure victims into their traps. Therefore, be careful if you feel alarmed by an email, if you are attracted to an offer posted on a website, or if you encounter wandering digital media lying around. If you are vigilant, you can protect yourself from most social engineering attacks that take place in the digital realm. In some cases, cybercriminals combine hate speech with a phishing attack to compromise your system and gain access to sensitive information. Installing and updating your anti-malware and antivirus software is essential to prevent malware from sending phishing emails. Our last type of social engineering attack of the day is known as tailgating or “piggybacking”. In these types of attacks, a person without proper authentication follows an authenticated employee in a restricted area. The attacker can pretend to be a delivery man and wait outside a building to get things done.

When an employee receives permission from the security service and opens the door, the attacker asks the employee to hold the door, thereby gaining access to the building. Let`s take an industrial scenario – with the ultimate goal of infiltrating a company`s network, the social engineer can distribute malware-infected flash drives or similar devices to employees in the hope that this hardware will be inserted into computers connected to the network to spread malicious code. Infected USB drives can be given to employees as a gift or reward for their participation in a survey. Maybe the innocent-looking devices are in a basket of gifts placed in the company lobby so that employees can easily grab them on the way back to their workspace. It would also be possible to strategically place spoiled devices for targeted employees. If labeled with intriguing labels like “Confidential” or “Salary Information,” the devices may be too tempting for some workers. These employees can simply take the bait and insert the infected device into their company`s computers – and voila! Cybercriminals have had great success with enticing offers to attract victims. They send targeted offers via ads, social media, emails or downloadable content for free. They offer their victims access to music, movies, games and free software. It is usually difficult to resist these offers. You can also prevent bait by being wary of tempting offers and not connecting unknown devices to your computer.