Return to overview
6 min read

What is phishing as a form of social engineering?

6 min read
February 27, 2025
By: Eye Security
social engineering and phishing
By: Eye Security
14 March 2025

Phishing, a form of social engineering, is a cyber attack that uses manipulation techniques to steal sensitive information. These attacks usually target individuals, businesses, or organisations aiming to obtain personal data in the form of passwords, credit card numbers, or other confidential information.

What is social engineering?

Social engineering is a type of cyber attack that manipulates individuals into divulging sensitive information or performing actions that compromise security. Unlike traditional hacking methods that exploit technical vulnerabilities, social engineering attacks exploit human psychology. These attacks rely on psychological manipulation to trick individuals into breaking normal security procedures and revealing confidential information.

Social engineering can be executed through various means, including phone calls, emails, text messages, and even in-person interactions. Attackers often pose as trusted figures or create convincing scenarios to gain the victim’s trust. By exploiting human vulnerabilities, social engineering attacks can bypass even the most robust technical security measures, making them particularly dangerous.

Understanding phishing attacks

Among the most common cyber threats affecting endpoints, phishing is a form of social engineering that involves using fraudulent messages. These messages often come via email or text, intending to create urgency, curiosity, or fear. Victims are prompted to reveal sensitive information, click on fraudulent links, or open malware-infected attachments.

Phishing campaigns are widespread attacks conducted through email and text messages, exploiting urgency, curiosity, or fear to deceive victims. These campaigns are characterised by their impersonal nature, targeting numerous users with near-identical messages, which makes them detectable by security systems that monitor for known threats.

Phishing methods are varied and continually evolving. Cybercriminals are now employing advanced AI tools and chatbots to craft more convincing phishing emails. This evolution enhances the credibility of their attacks and allows them to scale quickly, producing increasingly large numbers of high-quality automated message sequences and increasing the likelihood of success. 

Common phishing techniques

Description

Email phishing

Uses deceptive emails to extract sensitive information or prompt harmful actions

Vishing

Voice-based attacks using social engineering to trick victims over the phone (CISA)

Smishing

Text message-based phishing that convinces victims to divulge personal data or access malicious links

The impact of social engineering

Social engineering attacks exploit human error instead of software vulnerabilities, making them particularly challenging to predict and mitigate. These attacks rely on psychological manipulation, tricking individuals into performing actions that compromise security.

The effectiveness of social engineering stems from its ability to bypass traditional security measures. Unlike malware-based exploits, human mistakes are unpredictable, complicating detection and prevention efforts. 

Once sensitive personal and financial information is obtained through these tactics, it can be used for identity theft, allowing criminals to make unauthorised transactions or apply for loans in the victims' names.

Aspect

Impact

Psychological exploitation

Uses fear, urgency, or curiosity to manipulate victims

Unpredictability

Relies on human error, making it harder to detect

Evolving techniques

Utilises AI tools to enhance attack effectiveness

CIOs, CISOs, and IT professionals must remain vigilant and educate employees on recognising and responding to these threats. Integrating structured managed endpoint detection and response and leveraging SOC as a service can greatly enhance organisational defences against these evolving threats.

Types of social engineering attacks

Social engineering attacks come in various forms, each employing different tactics to deceive victims. Here are some common types:

  • Phishing: This attack uses fake emails, websites, or messages to trick victims into revealing sensitive information. Phishing attacks often create a sense of urgency or fear to prompt quick action.

  • Pretexting: In this type of attack, the attacker creates a fabricated scenario to gain the victim’s trust and obtain sensitive information. The attacker might pose as a colleague, a bank representative, or another trusted figure.

  • Baiting: Baiting involves offering something enticing, such as free software or a gift, to lure victims into revealing sensitive information or installing malware on their devices.

  • Quid pro quo: This attack offers a service or benefit in exchange for sensitive information. For example, an attacker might offer free tech support in return for login credentials.

  • Tailgating: Also known as “piggybacking,” this attack involves following an authorised person into a secure area to gain unauthorised access. The attacker might pretend to have forgotten their access card or use other pretexts to gain entry.

Understanding these different types of social engineering attacks is important for recognising and defending against them.

Types of phishing attacks

Phishing, the most common form of a social engineering attack, remains one of the most significant threats in the cybersecurity realm. Phishing scams include bulk phishing, spear phishing, and voice phishing, leveraging urgency and familiarity to increase success rates. In what follows, we sketch out the three primary types of phishing attacks: email phishing techniques, vishing and VoIP exploitation, and smishing through text messages.

Email phishing and spear phishing attacks

Email phishing is perhaps the most utilised technique in phishing attacks. Attackers typically register fake domain names to create fraudulent websites resembling real organisations and send malicious emails to potential victims. These emails often create a sense of urgency or fear to prompt quick actions from users.

Spear phishing involves sending malicious emails to specifically targeted individuals. Attackers usually possess information about the victim, such as their name, job, and interests. This information increases the effectiveness of the phishing email, making the victim more likely to comply with the requests.

Vishing and VoIP exploitation

Vishing, or voice phishing, involves the use of phone calls to trick victims into revealing sensitive information. Attackers often spoof the phone numbers of legitimate organisations, making their calls appear credible.Victims may also be directed to malicious websites designed to capture sensitive information or infect devices with malware.

VoIP Exploitation: With the proliferation of VoIP technology, attackers can easily spoof caller IDs, making it difficult for victims to identify legitimate calls. These attackers may claim to be tech support, bank representatives, or other trusted entities to extract personal information or payment details.

Smishing attacks through text messages

Smishing, also known as SMS phishing, use text messages to lure victims into sharing personal information. These messages may contain links to websites, email addresses, or phone numbers that, when clicked, can lead to malicious activities. The integration of email, voice, text, and browser functionality increases the chances of users becoming victims of these engineered malicious acts.

Type

Description

Malicious links

Leading to phishing websites or malware downloads

Fake alerts

Claiming urgent actions needed for account security

Fake promos

Offering prizes or discounts to entice clicks

Understanding these various types of phishing attacks is crucial for companies seeking to implement robust cybersecurity measures. By recognising the different phishing techniques, organisations can better equip themselves to defend against such attacks.

Notable phishing incidents

Phishing and social engineering have led to some of the most significant cybersecurity breaches in history. Here, we examine key incidents that highlight the impact of these threats.

Bangladesh bank heist

In February 2016, the Bangladesh Bank Heist demonstrated the devastating consequences of spear phishing. Hackers sent emails containing malware-infected attachments to bank employees. Once the attachments were opened, the malware infiltrated the bank’s systems, allowing the cybercriminals to steal approximately $81 million. This incident underscores the critical importance of email security and malware prevention.

Target data breach

The Target data breach in 2013 was one of the largest retail breaches in history. Hackers used phishing emails to install malware on the computers of a third-party vendor. This allowed the attackers to exploit an undiscovered vulnerability and escalate privileges within Target’s internal systems. The breach compromised over 40 million credit card numbers. This case highlights the necessity for robust supply chain cybersecurity measures.

Anthem data breach

In 2015, the healthcare insurer Anthem suffered a significant data breach that affected nearly 40 million individuals. The attackers gained access through a phishing attack, which allowed them to steal sensitive personal information. The incident cost Anthem approximately $230 million in remediation efforts, settlements, investigations, and fines. This breach stands as one of the most expensive and damaging phishing attacks in history, highlighting the need for comprehensive managed endpoint detection and response solutions.

These phishing incidents give us a glimpse into the tactics used by cybercriminals and show us how to take necessary precautions to protect against phishing and other social engineering threats.

Preventing phishing and other forms of social engineering attacks

Effective prevention of phishing and other social engineering attacks requires a vigilant approach that combines awareness, best practices, and verification techniques. Protecting personal and financial information from phishing attacks is key as cybercriminals often exploit this data to commit identity theft and financial fraud. Below are some strategies to reduce the risk of falling victim to these threats.

Recognising phishing red flags

Understanding the common characteristics of phishing attempts can help in identifying and avoiding them. Attackers are increasingly using AI tools to generate convincing messages and the rise of open-source LLM is making it easier than ever to execute phishing attacks with great efficiency. However, there are still some red flags that could point to a phishing attempt:

  1. Generic greetings. Many phishing emails still use vague salutations such as “Dear Customer” or “Dear User” rather than personalised greetings.
  2. Unfamiliar senders. Check the email address of the sender.
  3. Mismatched domains. Links within phishing emails often direct to domains that do not match the message content.
  4. Suspicious attachments. Exercise caution with emails containing attachments, especially if they are executable files (“.exe”) or HTML files that direct to login pages.
  5. Requests for personal information. Reputable organisations will seldom ask for sensitive information like financial details via email.

Best practices for cybersecurity awareness

The answer? Building a culture of cybersecurity awareness. Best practices include:

  • Regular training. Provides ongoing training to employees about the latest phishing techniques and social engineering tactics.
  • Simulated phishing tests. Conducting regular phishing simulations to test and improve response mechanisms.
  • Email filtering. Implementing robust email filtering systems to catch and block potential phishing emails before they reach a user’s inbox.

The importance of verification

The legitimacy of the sender should be verified at all times. Methods include:

  • Contacting the institution directly. Use verified contact details to reach out to the institution reportedly making the request.
  • Cross-checking information. Compare information from flagged emails with official communications from the sender.
  • Using multi-factor authentication (MFA). Implement MFA to provide an additional layer of security against unauthorised access.

By focusing on these key areas, organisations can significantly mitigate the risks associated with phishing and social engineering, protect their sensitive information and maintain robust cybersecurity standards.

Conclusion

Social engineering attacks pose a significant threat to both individuals and organisations, leading to the theft of sensitive information, financial loss, and reputational damage. Awareness of the various types of social engineering attacks and the techniques used by attackers is essential for effective defense.

To protect against social engineering attacks, individuals and organisations should implement robust security measures such as multi-factor authentication, encryption, and regular security awareness training. By staying vigilant and taking proactive steps, the risk of falling victim to social engineering attacks can be significantly reduced. Remember, the best defense against social engineering is a well-informed and cautious approach to handling sensitive information.

Let's talk

Curious to know how we can help?

Get in touch
GET IN TOUCH
Share this article.