50
Another way that social engineering is being conducted through engineering is
through direct attacks to the users. It is unbelievably easy for a social engineer to create a
fake or a cloned social media profile (Mouton et al., 2015). Social engineers are using these
fake or cloned accounts to get users to do them some favors such as giving out some
information or lending them some money (Bakhshi, Papadaki, and Furnell, 2009). Other
attackers are using these profiles to issue threats or commands to users and giving them
ultimatums to have some information or some money sent. There is also another group of
social engineers that uses social media to send malicious links to users. They come up with
the most enticing reasons to get users to click on these links. There are those that claim to be
giving out free money, others claim to have a system that can generate likes and followers,
and others are even offering ridiculous opportunities with an unbelievable pay (Snyder,
2015). Anything that can capture the interest and attention of a user is being used.
Social media has become one of the largest vehicles for social engineering. Every
fair-minded person can turn to be anyone on social media. Users on social media are not so
keen, and therefore it is easy for them to fall victim of cheap scams, requests from fake
accounts, and threats.
Dostları ilə paylaş: