texashuntingforum.com logo
Main Menu
Advertisement
Affiliates
Advertisement
Newest Members
Jackrabbit21, longhorntracker, Scoot N Shoot, AUSSIE - TEXAN, MightyESheepCo.
73094 Registered Users
Top Posters(All Time)
dogcatcher 110,840
bill oxner 91,416
SnakeWrangler 68,081
stxranchman 60,296
Gravytrain 46,950
Stub 46,281
RKHarm24 44,585
rifleman 44,461
Forum Statistics
Forums46
Topics551,056
Posts9,888,538
Members88,094
Most Online28,231
Feb 7th, 2025
Print Thread
Social engineering #9187858 02/17/25 06:09 PM
Joined: Apr 2005
Posts: 21,480
TurkeyHunter Online Content OP
determined
OP Online Content
determined
Joined: Apr 2005
Posts: 21,480
Some recent news spawned this topic. Have you been through any training on social engineering?

At my previous employer, a large multi-national, I had to complete several modules plus classroom training and pass tests.

Probably deal with it work about once a week. I've also found it helpful on a personal basis as well. How about you?

Re: Social engineering [Re: TurkeyHunter] #9187867 02/17/25 06:15 PM
Joined: Jan 2014
Posts: 13,281
P
Paluxy Offline
THF Celebrity
Offline
THF Celebrity
P
Joined: Jan 2014
Posts: 13,281
Yes, end users are the majority cause of all cybersecurity problems. Why hack when you can just get people to hand over their login credentials and then get them to actively participate in perpetuating the attack?

Re: Social engineering [Re: TurkeyHunter] #9187873 02/17/25 06:25 PM
Joined: Jan 2019
Posts: 4,788
1
10 Gauge Online Content
Extreme Tracker
Online Content
Extreme Tracker
1
Joined: Jan 2019
Posts: 4,788
I think it is terrible. The worst part about it is the way the higher ups adopt these ideas and pretend to support them to protect their careers. Our terminal manager chose this route and now his kids are trans/furry,

I say we were better off without it.


Joshua 1:9
Re: Social engineering [Re: TurkeyHunter] #9187874 02/17/25 06:33 PM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Some people don't know what even is.

Re: Social engineering [Re: ntxtrapper] #9187878 02/17/25 06:38 PM
Joined: Oct 2008
Posts: 18,654
6
68rustbucket Online Content
THF Celebrity
Online Content
THF Celebrity
6
Joined: Oct 2008
Posts: 18,654
Originally Posted by ntxtrapper
Some people don't know what even is.

I’d be one of them.



Re: Social engineering [Re: 68rustbucket] #9187880 02/17/25 06:44 PM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Originally Posted by 68rustbucket
Originally Posted by ntxtrapper
Some people don't know what even is.

I’d be one of them.


Scams to get people to divulge personal information. More elaborate than most simple ones like phishing emails.

Re: Social engineering [Re: TurkeyHunter] #9187882 02/17/25 06:48 PM
Joined: Apr 2005
Posts: 21,480
TurkeyHunter Online Content OP
determined
OP Online Content
determined
Joined: Apr 2005
Posts: 21,480

Re: Social engineering [Re: ntxtrapper] #9187894 02/17/25 07:21 PM
Joined: Apr 2005
Posts: 21,480
TurkeyHunter Online Content OP
determined
OP Online Content
determined
Joined: Apr 2005
Posts: 21,480
Originally Posted by ntxtrapper
Originally Posted by 68rustbucket
Originally Posted by ntxtrapper
Some people don't know what even is.

I’d be one of them.


Scams to get people to divulge personal information. More elaborate than most simple ones like phishing emails.



It can be national level intelligence services if you work in certain areas, technology and larger companies.

Re: Social engineering [Re: TurkeyHunter] #9187895 02/17/25 07:21 PM
Joined: Sep 2012
Posts: 18,712
J
Jimbo1 Online Content
THF Celebrity
Online Content
THF Celebrity
J
Joined: Sep 2012
Posts: 18,712
Every year while working for the government.


Awake - Not Woke!
Re: Social engineering [Re: Paluxy] #9187896 02/17/25 07:24 PM
Joined: Apr 2007
Posts: 62,961
BOBO the Clown Online Content
kind of a big deal
Online Content
kind of a big deal
Joined: Apr 2007
Posts: 62,961
Originally Posted by Paluxy
Yes, end users are the majority cause of all cybersecurity problems. Why hack when you can just get people to hand over their login credentials and then get them to actively participate in perpetuating the attack?


Yelp we go through it qtr’ly


Far better it is to dare mighty things, to win glorious triumphs, even though checkered by failure, than to take rank with those poor spirits who neither enjoy much nor suffer much, b/c they know not victory nor defeat"- #26 TR
Re: Social engineering [Re: TurkeyHunter] #9187911 02/17/25 07:46 PM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Hillary’s emails blasted one all over Washington.

Re: Social engineering [Re: TurkeyHunter] #9188078 02/18/25 12:16 AM
Joined: Jan 2019
Posts: 4,788
1
10 Gauge Online Content
Extreme Tracker
Online Content
Extreme Tracker
1
Joined: Jan 2019
Posts: 4,788
I thought this was the internet EO/HR training gone woke with the gay flags, etc. I made that assumption because i have a liberal cousin with a degree in social engineering or something that sounds similar 🤷‍♂️


Joshua 1:9
Re: Social engineering [Re: TurkeyHunter] #9188091 02/18/25 12:33 AM
Joined: Jan 2007
Posts: 27,293
KRoyal Online Sleepy
Texoma Legend
Online Sleepy
Texoma Legend
Joined: Jan 2007
Posts: 27,293
I constantly have social engineering rolling at my work. My staff have a button addon in their outlook client that they can use to alert IT/Cyber team they received something they think is a bad actor email. If the email is one that we have sent out it tells them good job and that it was simulated from IT. We also have a leaderboard staff can check if they’d like to see who is winning and not clicking on things. If it’s not a simulated email it sends notification to us and we go check it out in the system. If it is a bad actor we mark it depending on if it’s Spam, Phishing, or an actual Treat like Ransomware. Once it’s remediated if it’s a clean email it gets sent back to the user that flagged it. If it’s bad sender automatically gets blocked.

It’s fully automated system so that if we send out simulated emails and someone opens it and clicks on a link or opens an attachment they get a notification they’ve clicked on a simulated phishing email and are now in the clicker tier one group. I have tiers 1-6 setup and depending on how many times a user clicks depends on how much training they have to do. If a user gets over 6 clicks their access is locked until their supervisor can talk with them and make it clear if they continue to put us at risk for clicking stupid things in their email then they could lose their job.

I believe the national benchmark is 16.5% click rate, my organization is down to a 5.3% click rate. My staff are so scared to click on stuff I get a lot of false positives. But I’d rather have that, than the alternative of taking a hit and having an incident.

I also do physical social engineering by printing out QR codes and putting them in the break room, the QR code is linked to our training system as well. I put something like fill out employee survey for a chance to win $25 Starbucks gift card or something.

No one likes it and everyone thinks we’re out to get them, but that’s not the case it’s nothing more than a training tool and it’s much better me and my team getting them than some scammer.


[Linked Image]



Re: Social engineering [Re: KRoyal] #9188116 02/18/25 01:16 AM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Originally Posted by KRoyal
I constantly have social engineering rolling at my work. My staff have a button addon in their outlook client that they can use to alert IT/Cyber team they received something they think is a bad actor email. If the email is one that we have sent out it tells them good job and that it was simulated from IT. We also have a leaderboard staff can check if they’d like to see who is winning and not clicking on things. If it’s not a simulated email it sends notification to us and we go check it out in the system. If it is a bad actor we mark it depending on if it’s Spam, Phishing, or an actual Treat like Ransomware. Once it’s remediated if it’s a clean email it gets sent back to the user that flagged it. If it’s bad sender automatically gets blocked.

It’s fully automated system so that if we send out simulated emails and someone opens it and clicks on a link or opens an attachment they get a notification they’ve clicked on a simulated phishing email and are now in the clicker tier one group. I have tiers 1-6 setup and depending on how many times a user clicks depends on how much training they have to do. If a user gets over 6 clicks their access is locked until their supervisor can talk with them and make it clear if they continue to put us at risk for clicking stupid things in their email then they could lose their job.

I believe the national benchmark is 16.5% click rate, my organization is down to a 5.3% click rate. My staff are so scared to click on stuff I get a lot of false positives. But I’d rather have that, than the alternative of taking a hit and having an incident.

I also do physical social engineering by printing out QR codes and putting them in the break room, the QR code is linked to our training system as well. I put something like fill out employee survey for a chance to win $25 Starbucks gift card or something.

No one likes it and everyone thinks we’re out to get them, but that’s not the case it’s nothing more than a training tool and it’s much better me and my team getting them than some scammer.


Are the QR codes to try and train them to not scan them?

Re: Social engineering [Re: ntxtrapper] #9188123 02/18/25 01:25 AM
Joined: Jan 2007
Posts: 27,293
KRoyal Online Sleepy
Texoma Legend
Online Sleepy
Texoma Legend
Joined: Jan 2007
Posts: 27,293
Originally Posted by ntxtrapper
Originally Posted by KRoyal
I constantly have social engineering rolling at my work. My staff have a button addon in their outlook client that they can use to alert IT/Cyber team they received something they think is a bad actor email. If the email is one that we have sent out it tells them good job and that it was simulated from IT. We also have a leaderboard staff can check if they’d like to see who is winning and not clicking on things. If it’s not a simulated email it sends notification to us and we go check it out in the system. If it is a bad actor we mark it depending on if it’s Spam, Phishing, or an actual Treat like Ransomware. Once it’s remediated if it’s a clean email it gets sent back to the user that flagged it. If it’s bad sender automatically gets blocked.

It’s fully automated system so that if we send out simulated emails and someone opens it and clicks on a link or opens an attachment they get a notification they’ve clicked on a simulated phishing email and are now in the clicker tier one group. I have tiers 1-6 setup and depending on how many times a user clicks depends on how much training they have to do. If a user gets over 6 clicks their access is locked until their supervisor can talk with them and make it clear if they continue to put us at risk for clicking stupid things in their email then they could lose their job.

I believe the national benchmark is 16.5% click rate, my organization is down to a 5.3% click rate. My staff are so scared to click on stuff I get a lot of false positives. But I’d rather have that, than the alternative of taking a hit and having an incident.

I also do physical social engineering by printing out QR codes and putting them in the break room, the QR code is linked to our training system as well. I put something like fill out employee survey for a chance to win $25 Starbucks gift card or something.

No one likes it and everyone thinks we’re out to get them, but that’s not the case it’s nothing more than a training tool and it’s much better me and my team getting them than some scammer.


Are the QR codes to try and train them to not scan them?

It’s not necessarily to make them not scan QR codes. It’s to train them to be hyper aware of everything. There are “red flags” on all our social engineering. These are more so to train them to spot the red flags like an email that is from HR but the email address is a Gmail account or like the QR code the grammar will be pretty bad as if it’s written from someone that English is their second language like most scam emails you receive.

So mainly just to slow down and be vigilant.


[Linked Image]



Re: Social engineering [Re: KRoyal] #9188130 02/18/25 01:31 AM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Originally Posted by KRoyal
Originally Posted by ntxtrapper
Originally Posted by KRoyal
I constantly have social engineering rolling at my work. My staff have a button addon in their outlook client that they can use to alert IT/Cyber team they received something they think is a bad actor email. If the email is one that we have sent out it tells them good job and that it was simulated from IT. We also have a leaderboard staff can check if they’d like to see who is winning and not clicking on things. If it’s not a simulated email it sends notification to us and we go check it out in the system. If it is a bad actor we mark it depending on if it’s Spam, Phishing, or an actual Treat like Ransomware. Once it’s remediated if it’s a clean email it gets sent back to the user that flagged it. If it’s bad sender automatically gets blocked.

It’s fully automated system so that if we send out simulated emails and someone opens it and clicks on a link or opens an attachment they get a notification they’ve clicked on a simulated phishing email and are now in the clicker tier one group. I have tiers 1-6 setup and depending on how many times a user clicks depends on how much training they have to do. If a user gets over 6 clicks their access is locked until their supervisor can talk with them and make it clear if they continue to put us at risk for clicking stupid things in their email then they could lose their job.

I believe the national benchmark is 16.5% click rate, my organization is down to a 5.3% click rate. My staff are so scared to click on stuff I get a lot of false positives. But I’d rather have that, than the alternative of taking a hit and having an incident.

I also do physical social engineering by printing out QR codes and putting them in the break room, the QR code is linked to our training system as well. I put something like fill out employee survey for a chance to win $25 Starbucks gift card or something.

No one likes it and everyone thinks we’re out to get them, but that’s not the case it’s nothing more than a training tool and it’s much better me and my team getting them than some scammer.


Are the QR codes to try and train them to not scan them?

It’s not necessarily to make them not scan QR codes. It’s to train them to be hyper aware of everything. There are “red flags” on all our social engineering. These are more so to train them to spot the red flags like an email that is from HR but the email address is a Gmail account or like the QR code the grammar will be pretty bad as if it’s written from someone that English is their second language like most scam emails you receive.

So mainly just to slow down and be vigilant.


I'm sure you know much more about it than me, but my training was to never scan a QR code because a malicious one can contain small viruses or malware.

Re: Social engineering [Re: TurkeyHunter] #9188132 02/18/25 01:33 AM
Joined: Jan 2007
Posts: 27,293
KRoyal Online Sleepy
Texoma Legend
Online Sleepy
Texoma Legend
Joined: Jan 2007
Posts: 27,293
Yes QR codes can definitely be bad but they’re a part of daily life these days so we don’t try to tell them not to ever scan them, it’s not really our place, but just don’t really scan them at work lol. Hell some restaurants you can’t even get a menu at these days without scanning a QR code.


[Linked Image]



Re: Social engineering [Re: KRoyal] #9188135 02/18/25 01:36 AM
Joined: Mar 2010
Posts: 15,606
N
ntxtrapper Online Content
THF Celebrity
Online Content
THF Celebrity
N
Joined: Mar 2010
Posts: 15,606
Originally Posted by KRoyal
Yes QR codes can definitely be bad but they’re a part of daily life these days so we don’t try to tell them not to ever scan them, it’s not really our place, but just don’t really scan them at work lol. Hell some restaurants you can’t even get a menu at these days without scanning a QR code.


Reason #137 I live in the woods roflmao

Previous Thread
Index
Next Thread

© 2004-2024 OUTDOOR SITES NETWORK all rights reserved USA and Worldwide
Powered by UBB.threads™ PHP Forum Software 7.7.3