{"id":19651,"date":"2024-03-18T14:23:00","date_gmt":"2024-03-18T14:23:00","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=19651"},"modified":"2024-07-15T13:15:49","modified_gmt":"2024-07-15T13:15:49","slug":"14-types-of-social-engineering-attacks","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/","title":{"rendered":"14 Types of Social Engineering Attacks"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Social engineering is not new to organizations and cyber security professionals. But <\/span><b>what is a social engineering attack<\/b><span style=\"font-weight: 400;\">? Social engineering is the act of manipulating people into compromising security and giving up confidential information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals use different social engineering tactics to carry out their evil plans. The first step to countering such attacks is identifying the various techniques.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But <\/span><b>what are the different types of social engineering attacks<\/b> and <strong>why do cyber attackers\u00a0<\/strong><strong>commonly use social engineering attacks<\/strong>?<\/p>\n<p><span style=\"font-weight: 400;\">We introduce you to 14 <\/span><b>types of social engineering attacks <\/b><span style=\"font-weight: 400;\">common in the cyber world.<\/span><\/p>\n<h2><b>Pharming<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Pharming is one of the\u00a0<\/span><strong>types of social engineering attacks<\/strong><span style=\"font-weight: 400;\">\u00a0where an attacker uses the credulous nature of the victims to redirect them from a legitimate website to a fake site. The goal is to steal their usernames, passwords, and other sensitive information. This cyberattack hijacks a user&#8217;s browser settings or runs malicious code in the background. The ultimate goal is identity theft.<\/span><\/p>\n<h2><b>Tabnabbing\/Reverse Tabnabbing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Reverse tabnabbing or tabnabbing is an attack that exploits static websites. Here, a newly opened tab can hijack the original tab from where it\u2019s been opened. The new tabs can replace or modify the original tab and redirect users to scam sites so attackers can steal login details and other critical information.\u00a0<\/span><\/p>\n<h2><b>Scareware<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now that you know <strong>what social engineering attack is<\/strong> and how they essentially scare the users into giving up crucial information, it&#8217;s no wonder that\u00a0scareware is one. It tricks people into believing their computer has been infected with malware. The attacker then asks users to purchase malware disguised as real cyber security software. This attack leverages pop-ups and other social engineering tactics.\u00a0\u00a0<\/span><\/p>\n<h2><b>Email Hacking<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Email hacking involves attackers gaining unauthorized access to victims\u2019 email accounts. Cybercriminals can hack your account using different techniques. We\u2019ll go over some of them in this section.\u00a0<\/span><\/p>\n<h3><b>BEC (Business Email Compromise)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/business-email-compromise-bec-2021-cybersecurity-problem\/\" target=\"_blank\" rel=\"noopener\">Business Email Compromise (BEC)<\/a> is a dangerous email cybercrime that hacks a business email account and impersonates high-level employees to scam partners, other employees, and customers. BEC targets companies that conduct wire transfers and have clients overseas. Hackers use it to make <\/span><b>social engineering attacks <\/b><span style=\"font-weight: 400;\">more effective.\u00a0<\/span><\/p>\n<h3><b>Spam<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A <a href=\"https:\/\/easydmarc.com\/blog\/what-is-spam-email-and-how-to-prevent-it\/\" target=\"_blank\" rel=\"noopener\">spam attack<\/a> consists of cybercriminals sending numerous emails to their victims. Spam messages can be sent by real humans or botnets (a network of malware-infected computers controlled by an attacker). The attacker aims to trick users into downloading malware or sharing sensitive data.\u00a0<\/span><\/p>\n<h3><b>Phishing<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing is one of the <\/span><b>main types of social engineering methods<\/b><span style=\"font-weight: 400;\"> executed via email. The attacker sends fake email containing malicious links. The goal is to steal your identity or money by getting you to reveal confidential data. Use this free tool to find out &#8211; <a href=\"https:\/\/easydmarc.com\/tools\/phishing-url\">is this link safe<\/a> or not.<\/span><\/p>\n<h3><b>Other Phishing Types<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As time goes by, malicious actors perfect their tactics. Various <a href=\"https:\/\/easydmarc.com\/blog\/real-life-phishing-email-examples-and-their-impact\/\" target=\"_blank\" rel=\"noopener\">phishing types<\/a> are the best\u00a0<\/span>social engineering attacks examples.<\/p>\n<h4><b>Spear-phishing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Spear-phishing is a targeted attack where criminals disguise themselves as legitimate sources to convince specific victims to reveal personal, financial, and other sensitive data. Unlike traditional phishing, spear phishing requires in-depth reconnaissance.\u00a0<\/span><\/p>\n<h4><b>Angler Phishing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-angler-phishing-and-how-can-you-avoid-it\/\" target=\"_blank\" rel=\"noopener\">Angler phishing<\/a>, named after the anglerfish, is the latest online scam on social media. Cyberattackers create fake social media accounts to masquerade as a company\u2019s customer service agent, hoping to lure and victimize dissatisfied customers.<\/span><\/p>\n<h4><b>Whaling\/CEO Fraud<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/whaling-how-it-works-and-how-to-avoid-it\/\" target=\"_blank\" rel=\"noopener\">Whaling or CEO fraud<\/a> is a phishing attack targeting high-level individuals such as Chief Executive Officers, Chief Financial Officers, or board members. The attacker aims to steal sensitive information or trick employees into authorizing huge transfers or divulging asset information.<\/span><\/p>\n<h2><b>Access Tailgating<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/\" target=\"_blank\" rel=\"noopener\">Access tailgating<\/a> is a common physical security breach where a cybercriminal follows an authorized person into a restricted area. This <\/span><b>type of social engineering attack<\/b><span style=\"font-weight: 400;\"> leverages human courtesy to help others. The most common example is holding the door for an unknown individual behind them.<\/span><\/p>\n<h2><b>Baiting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Baiting is one of the common and simplest <\/span><b><a href=\"https:\/\/easydmarc.com\/blog\/social-engineering-a-complete-guide\/\" target=\"_blank\" rel=\"noopener\">social engineering attacks<\/a> examples<\/b><span style=\"font-weight: 400;\">. While similar to phishing, baiting uses false promises of a reward to ignite a victim\u2019s curiosity and greed. These attackers typically leverage the offer of free movie or software downloads, tricking users into inputting their login details.\u00a0<\/span><\/p>\n<h2><b>DNS Spoofing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">DNS spoofing, also known as DNS cache poisoning, is an attack type where cybercriminals use altered domain names to redirect users to a malicious website disguised as the intended site. Now that we&#8217;ve identified\u00a0<\/span><strong>what a social engineering attack is<\/strong>, you might already know what happens after that.\u00a0<span style=\"font-weight: 400;\">Users are prompted to input their login credentials, allowing attackers to steal sensitive data.\u00a0\u00a0<\/span><\/p>\n<h2><b>Pretexting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Pretexting is one of the simplest <\/span><a href=\"https:\/\/easydmarc.com\/blog\/how-does-social-engineering-affect-an-organization\/\" target=\"_blank\" rel=\"noopener\"><b>social engineering attacks<\/b><\/a><span style=\"font-weight: 400;\"> where cybercriminals create scenarios to convince victims to divulge private information or access network resources. In most cases, the perpetrator usually comes up with a convincing story, or pretext, posing as a legitimate authority to fool the victim.\u00a0<\/span><\/p>\n<h2><b>Physical Breaches<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Physical breaches aren&#8217;t the first\u00a0<\/span><strong>social engineering attacks examples<\/strong>\u00a0you think of. However, some<span style=\"font-weight: 400;\">\u00a0security issues involve the physical theft of confidential documents and other valuables like computers and storage drives. These breaches can be caused by tailgating and unauthorized access to the company building.<\/span><\/p>\n<h2><b>Watering Hole Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A <a href=\"https:\/\/easydmarc.com\/blog\/easydmarcs-alert-management\/\" target=\"_blank\" rel=\"noopener\">watering hole attack<\/a> is targeted security exploit where cyber actors seek to compromise a specific group of users by infecting the website that members of the group visit often. Attackers aim to infect their victims\u2019 computers and gain access to their network resources.\u00a0\u00a0<\/span><\/p>\n<h2><b>Quid Pro Quo<\/b><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/what-is-quid-pro-quo\/\" target=\"_blank\" rel=\"noopener\">Quid pro quo<\/a> is another one of the common <\/span><b>social engineering attacks<\/b><span style=\"font-weight: 400;\">. Here, hackers promise a benefit to lure victims into revealing personal information. For example, you can get a call from a random number claiming to be a technical support specialist from one of the services you use. They would request critical data in exchange for a service.\u00a0<\/span><\/p>\n<h2><b>Diversion Theft<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diversion theft, also known as a \u201ccorner game,\u201d started as an offline attack where perpetrators intercept deliveries by diverting them to the wrong locations. Due to technological advancements, cyber actors can now intercept and divert deliveries online. They can also trick victims into sending information to the wrong source.\u00a0\u00a0<\/span><\/p>\n<h2><b>Honey Trap<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A honey trap is one of the\u00a0<\/span><b>social engineering attacks<\/b><span style=\"font-weight: 400;\"> that use sexual relationships to compromise networks and lure people into divulging critical information. In most cases, honey trapper creates a female profile, identifies their victims, and then befriends them to gain their trust.\u00a0<\/span><\/p>\n<h2><b>Advance Fee Scams<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Advance fee scams are\u00a0<\/span><strong>what a social engineering attack is<\/strong>. It&#8217;s a\u00a0classic technique that involves<span style=\"font-weight: 400;\">\u00a0attackers asking targets to pay in advance before receiving promised services, goods, or products, which they\u2019ll never receive. The notorious \u201cNigerian Prince\u201d scams are a good example.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><b>Social engineering attacks<\/b><span style=\"font-weight: 400;\"> are successful due to human error and the failure to identify patterns used by cyber attackers. That said, organizations must educate their employees on the impact of these attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our blog features articles on each attack type mentioned above. Check them out to understand <\/span><b>different types of social engineering attacks<\/b><span style=\"font-weight: 400;\"> and <a href=\"https:\/\/easydmarc.com\/blog\/how-to-spot-the-top-5-social-engineering-attacks\/\" target=\"_blank\" rel=\"noopener\">how to prevent them<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering is not new to organizations and &#8230;<\/p>\n","protected":false},"author":5,"featured_media":19652,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-19651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>14 Types of Social Engineering Attacks | EasyDMARC<\/title>\n<meta name=\"description\" content=\"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"14 Types of Social Engineering Attacks\" \/>\n<meta property=\"og:description\" content=\"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-18T14:23:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T13:15:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"14 Types of Social Engineering Attacks\",\"datePublished\":\"2024-03-18T14:23:00+00:00\",\"dateModified\":\"2024-07-15T13:15:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/\"},\"wordCount\":1171,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/24.01-2.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/\",\"name\":\"14 Types of Social Engineering Attacks | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/24.01-2.jpg\",\"datePublished\":\"2024-03-18T14:23:00+00:00\",\"dateModified\":\"2024-07-15T13:15:49+00:00\",\"description\":\"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/24.01-2.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/24.01-2.jpg\",\"width\":1440,\"height\":910,\"caption\":\"24.01 2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/14-types-of-social-engineering-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"14 Types of Social Engineering Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"14 Types of Social Engineering Attacks | EasyDMARC","description":"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/","og_locale":"en_US","og_type":"article","og_title":"14 Types of Social Engineering Attacks","og_description":"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!","og_url":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2024-03-18T14:23:00+00:00","article_modified_time":"2024-07-15T13:15:49+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"14 Types of Social Engineering Attacks","datePublished":"2024-03-18T14:23:00+00:00","dateModified":"2024-07-15T13:15:49+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/"},"wordCount":1171,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/","url":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/","name":"14 Types of Social Engineering Attacks | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","datePublished":"2024-03-18T14:23:00+00:00","dateModified":"2024-07-15T13:15:49+00:00","description":"The cyberworld is filled with various social engineering attack types. This article sums up almost all known methods and more!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","width":1440,"height":910,"caption":"24.01 2"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"14 Types of Social Engineering Attacks"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/24.01-2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=19651"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19651\/revisions"}],"predecessor-version":[{"id":41165,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19651\/revisions\/41165"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/19652"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=19651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=19651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=19651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}