cloudHQ

Helping your productivity, 1 click at a time.

  • LinkedIn
  • Facebook
  • Twitter
Log in Sign up
MENUMENU
  • Home
  • Featured Apps
    • Export Emails to Google Sheets
    • Export Emails to Google Docs
    • Gmail Email Templates
    • Save Emails To PDF
    • Multi Email Forward
    • Email Campaigns and Mail Merge
  • Productivity
    • Auto Follow Up for Gmail
    • AutoBCC for Gmail
    • Email Signature Generator
    • Free Email Tracker
    • Free HTML Editor for Gmail
    • Free Screencast recording for Gmail
    • Gmail Label and Email Sharing
    • Gmail Phone
    • Gmail Screenshot
    • Gmail SMS Text Alerts
  • Google Workspace
    • Gmail
    • Google Apps
    • Google Docs
    • Google Sheets
    • Google Slides
    • Google Drive
    • Google Shared Drives
    • Google Contacts
  • Categories
    • Artificial Intelligence
    • Cloud Computing
    • Dropbox
    • Education
    • Egnyte
    • Google Chrome Web Store
    • More ...

Social Engineering Attacks: What You Need To Know To Defend Your Accounts

Social engineering is nothing new, it’s been happening for centuries. But online, the effects of social engineering can be disastrous as many differing types of accounts can be compromised, deleted or used for information gain. Social engineering is the term for the process of socially tricking someone into giving out information which can be used for the attacker’s agenda. For instance, if someone pretends to befriend you and gain your trust only to gain information from you, this is social engineering. In this article, we will look at the top 5 social engineering attacks that you need to be on the lookout for. We will also look at how you can protect yourself, your online accounts and your data from these attacks.

Top 5 social engineering attacks

Phishing

Phishing is one of the top 5 social engineering attacks as it involves the use of faked emails, websites or other online content designed to look like a legitimate (and usually popular) login site. For instance, a site that is designed to look exactly like the login page for Facebook or Twitter could be used to steal usernames and passwords. Usually, a faked email that is designed to look like it is from one of the sites will inform the user that his account has been compromised and he needs to visit this link to change his password. The user clicks the link, is taken to the fake login page and unknowingly gives out his login information.

Other phishing attacks are more harmful as they involve financial institutions such as banks or PayPal, as well as fake credit card scams, money wire scams and lottery scams. Here is an example of an actual PayPal phishing email in which the attacker impersonated a PayPal employee.

“It has come to our attention that 98 percent of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non-existent items. Thus, we require our members to add a debit/check card to their billing records as part of our continuing commitment to protect your account and to reduce the instance of fraud on our website. Your debit/check card will only be used to identify you. If you could please take 5-10 minutes out of your online experience and renew your records, you will not run into any future problems with the PayPal service. However, failure to confirm your records will result in your account suspension.”

The email included the link to a website that was designed to look like PayPal and requested the user to update their credit card information. Many users unknowingly gave out their credit card information which was then obtained by the attacker.

Tech Impersonation

As most computer users are not very computer-literate, they are always happy to accept help from tech support. Social engineers are able to use this lack of knowledge and fear to obtain access to their information and accounts by pretending to be tech support agents. Often these attackers will use phone calls but they will also use emails, instant message, chat or other messaging systems to get their message through. Here is an example of a social engineering phone call or instant message could go down.

Attacker: “Hey, this is Charles with tech support. We had some attacks on our system and noticed that several passwords could have been stolen. We are requesting that everyone changes their passwords immediately to protect the account. It’s possible that your password could have been one that was stolen, so if it’s okay, I’ll help you through the process.”

Unsuspecting user: “Oh my! Certainly, please do! Thank you.”

Attacker: “Okay, just click on “change password.” Please choose a strong password that includes lowercase, uppercase and numbers to prevent hackers from getting access to your password again. What password would you like to use?”

Unsuspecting user: “okay…what about VisCeral80372? Does that sound like it’s secure enough?”

Attacker: “Yes, that sounds perfect. Please type in your new password and click on the OK button. Thank you for helping us keep your computer secured.”

Give users what they want

This may be the most common of the top 5 social engineering attacks as it usually targets users who are already involved in illegally downloading files such as movies, programs or music. The attacker purposely adds malware to the file and then purports it as an early-release DVD copy or music album pre-release. Users eagerly download the file and open it. Those without anti-virus or other security on their computer will unknowingly install the software which will then track their activity on the computer and steal passwords, user names, credit card information, bank information and much more.

By using this form of social engineering at the right time, such as a few weeks before a movie appears at a theater or before an album is released, the attacker plays on the eagerness of users that want to get early access to the file and it can affect thousands of computers before it is shut down.

Pay for information

Social engineers don’t often just walk up to you and offer to pay for information but they will go to other lengths to steal your information by giving you something in return for it that’s worth something to you. Offers may include free ringtones, free games, free T-shirts, gift certificates or even money sent directly to your PayPal account. Often times, the offer sounds too good to be true and is completely fake, but you would be amazed at how many users eagerly input their information expecting to receive something free or money in return.

The borrower

This one made the list if the top 5 social engineering attacks because “fake friends” are becoming far too common. This happens when a person befriends you or interacts with you for the sole purpose of obtaining information from you. Maybe the person is smoking outside the building when you walk in through a restricted area door and they follow you in, perhaps even thanking you and asking how your day is going. Perhaps it’s someone who wants to borrow your phone to make a call or laptop to check their email. There is any number of ways that attackers will attempt to befriend people or even appear like a person in distress in order to gain information from unsuspecting victims.

So now the question becomes- what if I fell for one of these scams?

My account was compromised and my data was deleted!

I’ll use Gmail as an example of a compromised account although this can happen to any web account. So you fell from one of these scams and not only did the attacker get your information and access your Gmail account, he deleted all your Gmail emails! Years of emails and attachments- GONE! Okay, no problem, just go to your backup account and restore…wait, what? You don’t have a backup account? I am so sorry…

The solution is cloudHQ. CloudHQ is a cloud backup and synchronization service that that provides backup for cloud accounts and Gmail. So if you think Google is protecting all of your Gmail emails, you may want to think again. Once your account is compromised, Google’s system thinks the intruder is YOU and respectfully obeys his wishes and commands. So when he tells the system to delete all emails, they go to the Trash. Then he goes to the trash and deletes the emails permanently. I don’t need to explain what “permanently” means.

But if you use cloudHQ to back up your Gmail emails and attachments, you will always have a safe, secure secondary copy of all your emails and attachments. The backups are stored to separate cloud account such as a Dropbox or Box account with completely separate authentication credentials. So even if the attacker gains access to your Gmail account, he will be unable to access your backup account and you can quickly restore all emails and attachments to your Gmail account.

CloudHQ provides this service for cloud services as well, not just Gmail accounts. You can back up your Dropbox, Box, SkyDrive, Evernote, Google Drive and other accounts using the same service. Sign up now for your 15 day free trial and have instant protection “just in case” you fall for one of these scams. Once it happens, it will be too late. Get cloudHQ protection now.

Related articles
  • Business IT Security Tip – Be aware of “Social Engineering” – phishing (topsectechnology.wordpress.com)
  • Something smells phishy. The importance of Social Engineering Training (concise-courses.com)
  • Experts Concerned About Ubisoft’s Password Encryption Practices (news.softpedia.com)
  • It’s Easy to Protect Yourself from the “Phishing” Net Ally Bank Works to Keep Your Money Secure (ally.com)
  • Scambook Warns of 4th of July Scams: Patriotic Phishing and Un-American Sales (prweb.com)
  • How to reduce Phishing attacks? (quatrashield.com)
  • Popular Twitter Hashtag Fills up Social Engineers’ Data Base (hotforsecurity.com)
  • How to Hack Facebook Account Passwords 100%? (hackingandsec.wordpress.com)
  • How to hack facebook accounts? (shaunhacksit.wordpress.com)
  • The Onion Gets Hacked (social-engineer.org)

Posted On: 7/8/2013By: Dizdar Senad

Filed Under: Cloud Computing

View AMP version

Footer

cloudHQ Backup, Migration & Sync
cloudHQ Backup, Migration & Sync product can sync, back up, copy, migrate, convert, and replicates data between different cloud service providers.
GET STARTED
cloudHQ Apps

We all hate email, but still, spend most of our day there. Because of that, we created over 60 Gmail productivity tools to help keep you be productive in the email.
All cloudHQ Apps
Contact Us
  • Contact
  • Terms Of Service
  • Privacy
  • Security
  • Table of Content
Subscribe
©2025 cloudHQ - All Rights Reserved.

Categories

  • Amazon S3 (5)
  • Artificial Intelligence (33)
  • Auto Follow Up for Gmail (1)
  • Cloud Computing (213)
  • cloudHQ Apps (434)
    • Attach and Embed YouTube Video in Gmail (2)
    • Auto Follow Up for Gmail (6)
    • auto gmail follow up (4)
    • AutoBCC for Gmail (8)
    • chatgpt for Gmail (13)
    • ChatGPT for Google (1)
    • ChatGPT Sidebar (2)
    • Convert Google Docs To Gmail Drafts (1)
    • Display Email Time by cloudHQ (1)
    • Email List Builder (20)
    • Email Privacy Protector: Is My Email Tracked? (4)
    • Email Reply Status (1)
    • Email Sender Icons (1)
    • Email Signature Generator (19)
    • Email Templates for Outlook and Gmail (11)
    • Email Tracking Blocker (2)
    • Email Zoom text Reader (2)
    • Export Emails to Google Docs (7)
    • Export Emails to Google Sheets (55)
    • Formatted Email Subject Lines (4)
    • Free Email Tracker (20)
    • Free HTML Editor for Gmail (3)
    • Free Mail Tracker (5)
    • Free Pause Gmail (4)
    • Free Screencast recording for Gmail (11)
    • Get My Receipts (1)
    • Gmail Auto Label (4)
    • Gmail Button (5)
    • Gmail Conversation Thread Reversal (1)
      • Gmail conversation view (1)
    • Gmail Copilot (8)
    • Gmail Email Links (3)
    • Gmail Email Templates (89)
    • Gmail Free Online Polls & Surveys by cloudHQ (4)
    • Gmail Inbox Zero (1)
    • Gmail Label and Email Sharing (25)
    • Gmail Message Preview (1)
    • Gmail Notes (3)
    • Gmail Phone (2)
    • Gmail Screenshot (13)
    • Gmail SMS Text Alerts (12)
    • gmail snippets (2)
    • Gmail Tables (3)
    • Gmail Tabs (5)
    • Gmail Time Tracker (3)
    • Gmail URL Link Preview (5)
    • Gmail Web Clipper (1)
    • Google Docs Templates (15)
    • Google Forms Templates (2)
    • Google Slides Theme Templates (1)
    • Happy Mother's Day Cards (5)
    • Highlight Emails in Gmail (1)
    • Hubspot Templates in Gmail (1)
    • MailKing Email Campaigns and Mail Merge (65)
    • mailking: send mass text from email text message SMS marketing campaigns (16)
    • mailto: (1)
    • meeting scheduler (32)
    • Multi Email Forward (8)
    • Multi Email Forward for Gmail (21)
    • Resize Gmail Sidebar (2)
    • save and backup my emails (1)
    • Save Emails To Box (2)
    • Save Emails To Dropbox (3)
    • Save Emails To Egnyte (3)
    • Save Emails To Google Drive (8)
    • Save Emails To OneDrive (2)
    • Save Emails To OneDrive Business (2)
    • Save Emails To OneNote (2)
    • Save Emails To PDF (43)
    • Save Emails To Salesforce (3)
    • Save Emails To SharePoint (6)
    • Save My Email (1)
    • Save My Emails (3)
    • Send Your Email to SMS (text) (6)
    • Share & Attach Files In Gmail (2)
    • Simple email view (4)
    • Sort Gmail inbox by (5)
    • Sync Google Drive With Dropbox (3)
    • Sync Salesforce Contacts To Google (2)
    • Tiny Sketchbook (3)
    • Unique URL Links for Email Conversations (4)
    • Valentines Day (2)
    • Video Email (9)
  • cybersecurity (1)
  • Dropbox (73)
  • Education (7)
  • Egnyte (9)
  • Email Templates Gmail (4)
  • Email Templates Outlook (4)
  • Google Chrome Web Store (4)
  • Google Sheets Templates (3)
  • Google Workspace (194)
    • Gmail (68)
    • Google AI (3)
    • Google Apps (40)
    • Google Contacts (1)
    • Google Docs (56)
    • Google Drive (73)
    • Google Shared Drives (1)
    • Google Sheets (17)
    • Google Slides (9)
  • Happy Easter Cards (1)
  • HTML editor for Google Drive (1)
  • Microsoft 365 (3)
  • microsoft sharepoint (2)
  • Mobile Text Alerts for Gmail (1)
  • Outlook Email Templates (4)
  • Productivity (1)
  • technology (1)
  • Text Editor for Google Drive (1)