Social Engineering Attacks: Things One Should Know to Avoid Payment Scams

Post by:
April 1, 2021
Post by:
No items found.
April 1, 2021
Social Engineering Attacks: Things One Should Know to Avoid Payment ScamsSocial Engineering Attacks: Things One Should Know to Avoid Payment Scams

Social engineering refers to psychologically manipulating people to make them act or divulge information—this is an activity that happens all the time without us even realizing that it is happening. All forms of persuasion or leveraging influence to make someone behave in a certain way or make decisions that benefit us are social engineering. However, in our context, we shall concentrate on deliberate efforts by individuals to defraud, especially from a financial standpoint.


Since human beings are the weakest link in cybersecurity, 98% of all cyberattacks result from the social engineering of individuals within an organization, including senior management and IT professionals. Furthermore, fraudsters conduct most of these attacks successfully, impersonating senior management and targeting new employees.  


Social engineering attacks fall under two broad categories. The first is ‘credential’ or ‘personal information harvesting’ for sale on the dark web—the information is used for proper attacks involving account creation or takeover at a later time. The other one, a more sophisticated form of social engineering attack, involves forcing victims in real time to conduct fraudulent activities or grant access to fraudsters through a remote connection to gain access to online banking platforms.

Personal Information Harvesting

  1. Phishing: In this type of attack, fraudsters secure information by pretending to be a legitimate source while at the same time embedding malware for purposes of data harvesting. More often than not, email messages are made to appear as if they have been sent from senior management or legal or law enforcement. This form of cyberattack includes seemingly authentic email delivery failure notification (usually with a link), scanned documents, or packaged delivery. During this time of COVID-19, there has been a significant spike in phishing attempts through emails claiming to be from WHO, CDC, and other government bodies.
  2. Vishing: This is a form of phishing that takes place over a telephone call. The attacker impersonates a trusted individual and tricks the victim into divulging sensitive information. In the most common form of vishing in the payments industry, the attacker impersonates a customer care agent claiming that something is wrong with the victim’s account and asks for additional information to fix it. The information required is always financial in nature, such as credit card numbers or verification codes. The fraudster asks some underlying security questions as well.
  3. Smishing: In this form of phishing, fraudsters use text messages to trick users into downloading malware on their phones. It is usually done to bypass 2FA since most financial institutions use text messages as a delivery channel for secret access codes to their system.

Scammers use all three forms of phishing to obtain enough data and impersonate account owners to access and transfer funds.

Real-Time Social Engineering

  1. Synthetic Media Attacks (Deepfakes): Fraudsters can use AI-generated synthetic media to impersonate a real person and dupe their victims into making financial transactions in real time, especially by using voice-altering technology to mimic the actual person.
  2. RAT Attacks: This technique involves scammers convincing the victims to install or allow a remote access connection to their computer, ostensibly for technical support. Once connected, the scammer can gain access to online banking details and transfer funds. Remote Access Tools (RAT) are commonly used for cyberattacks on the elderly. 

How to Avoid Social Engineering Attacks

Organizations can minimize their exposure to social engineering attacks, especially phishing, by training their employees on the basics of cybersecurity. Most phishing attempts can be stopped by just a simple change in behavior, such as ensuring that the attachments received with emails were anticipated and are actually from a legitimate source.

A strong email filtering and email malware scanning tool can also help reduce some of these attacks. There should be internal policies and procedures defining communication protocol within the organization. This means that there should be a way of verifying the legitimacy of over-the-phone instructions to transfer funds from senior management. If the beneficiary is new or unknown, there should be a procedure in place for proper verification.

Behavioral biometrics methods, such as the one offered by BioCatch, can also be used to combat the use of information for phishing activities. Behavioral biometrics can differentiate legitimate users from fraudsters by comparing their behavior once they log into a secure system like an online banking channel. It is capable of flagging the login session as legitimate or illegitimate based on how the user performs certain tasks, such as pages the user visits or the pace at which they navigate the various service menus. With this, behavioral biometrics detects whether the user is under the control of someone else or is the legitimate user of the account.

However, all these efforts cannot wholly eliminate social engineering attacks for as long as systems used in banks require human intervention. The endgame: minimize human engagement, especially with core banking systems and information warehouses, and opt for automation.

To learn about Prove’s identity solutions and how to accelerate revenue while mitigating fraud, schedule a demo today.

Create secure frictionless customer experiences using modern identity solutions

Join over 1,000 businesses that rely on Prove across multiple industries, including banking, FinTech, healthcare, insurance, and e-commerce. Contact us today.

Prove: the world’s most accurate identity verification and authentication platform

Trusted by 1,000+ leading companies to reduce fraud and improve consumer experiences. Contact us today to learn how you can frictionlessly secure your digital consumer journey — from onboarding to ongoing transactions.

Keep Reading...Read our latest white-paper on this subject!

Tap the button below to read our latest white-paper on the subject as industry leaders.

Accelerate your onboarding

Contact us to learn how leading companies are using Prove Pre-Fill to modernize the account creation process by shaving off clicks and keystrokes that kill conversion.

Create frictionless customer experiences

Get in touch to find out how we can help you identify your customers at every stage of their journey and offer them seamless and secure experiences.

Schedule a demo

Let our expert team guide you through our identity verification and authentication solutions. Select a date and time that works for you.

Schedule a demo

Find out how we can help you deliver seamless and secure customer experiences that comply with PSD2/SCA. Select a date and time that works for you.

Interested in more information about Prove Pre-Fill?

Download the Report

Download Aite-Novarica Group’s full report about Prove Pre-Fill, including a product overview, customer results, and how the product works.

Interested in more information about MFA?

Download the guide now to learn how you can improve security, cut down on fraud, and create the best possible customer experience.