This post takes a look at the definition & examples of Socially Engineered Malware or SEM and the tactics employed by fraudsters to push malware. It also lists some basic precautions web surfers should take.
Socially Engineered Malware
Socially engineered malware falls into the bracket of social engineering. The term Social Engineering refers to the method of creating traps for regular Internet users who start trusting the hackers and provide them with the information they want. It is, in short, an act of psychological manipulation and its usage has caught on among malware pushers, and its use to distribute malware to consumers and enterprises has been browsing steadily.
Social engineering started as a tool to get the inside information of business houses and went on to become the most (mis)used tool on the Internet. These days, hackers (social engineers, as they are called) use different methods to gain the trust of the normal users. Once they gain the trust, they can get the user to do exactly what they want and thus get the information they need.
Socially engineered malware – Meaning & Definition
Socially engineered malware works on the same foundation. Social engineers will send you links, attachments or just an image (as it happened in ObamaCare). If you click on the links, images or download email attachments, you will download malware to your computer. This malware will then collect and send all your information to the pre-configured IP address.
In today’s context, one can also refer to it as Phishing, but phishing is a bit different that it does not make much emphasis on making sure the users click the bait. It is more like throwing bait into open and hoping that someone will take it. SEM is more focused.
The social engineers send you an email in a way that you start trusting it enough to click the link in email or download the attachment with the mail. It is always better to use an email client and set its security to maximum. That way, not only you stop getting junk, but most social engineering attempts will also go to junk folders of the email client. When you set the security to maximum, there is a good chance that an expected email can also to be classified as junk, so you need to keep checking your junk or spam folders regularly.
Precautions to take to protect yourself from socially engineered attacks
Use a good Email services provider & an Email Client
As mentioned, using an email client is a good defense against social engineering, as it transfers phishing attempts to junk or spam folders.
Use a good secure web browser
A good browser will just not open the bad links. Internet Explorer blocks 99% of malware. The SmartScreen filter in Internet Explorer continues to offer industry leading protection against socially engineered malware. The SmartScreen Filter in Internet Explorer will also stop Drive-By-Downloads. Chrome is also pretty effective.
Use a good security software
Education against social engineering is important. If a user knows about social engineering and phishing attempts, he or she will not fall prey to it. If not, even the best defense would fail.
For example, if you get an email from a certain company, you should look at the senders email ID first, before clicking anywhere in the mail body. Never download or click on attachments, until you make sure it is a legitimate email.
Never click on offered links to update your personal, financial or login information. It is better to enter the URL manually, and then login. You often receive emails from Paypal that, instead of Paypal, are sent by lookalike email IDs. You will know when you look at the email ID. The domain should be Paypal.com and not something like email@example.com. In the latter case, the email domain is not PayPal but something.com.
You simply need to be on your guard when an email from an unknown source arrives.
Social engineering attempts also come disguised as offers. But use the above-mentioned method – never ever use a URL to update or provide your information. Launch the browser and then enter the URL via a bookmark or manual typing.
In some cases, people compromise your friends’ email ID and use it to send you socially engineered emails – Email Spoofing. When we say ‘Socially engineered email’, they are email crafted to appeal to you. They may not contain links, but they will ask directly about your bank information so that they can get some help. For example, if you get an email from your friend saying he or she is stranded somewhere and needs some money, it is always better to give them a call rather than replying to such emails and falling prey.
This posts does not define socially engineered malware in a comprehensive way, as there are several other methods being used by criminals. The methods keep on evolving. I have just tried to touch upon the subject.