Social Engineering bezeichnet eine zwischenmenschliche Manipulation, mit deren Hilfe Cyberkriminelle sich Zugriff auf fremde Rechnersysteme und sensible Daten verschaffen. Der Begriff stammt aus dem Englischen und setzt sich zusammen aus „social“, übersetzt „zwischenmenschlich“, und „engineering“,wörtlich übersetzt „Konstruktion“. Es handelt sich also um eine gezielte Konstruktion einer zwischenmenschlichen Beziehung.
Das Prinzip von Social Engineering ist nicht neu. Im Alltag ist es unter Begriffen wie „Betrügerei“ und „Hochstaplerei“ bekannt. Die digitalen Medien eröffnet Kriminellen hierfür neue Möglichkeiten:
Häufig nutzt Social Engineering menschliche Stärken für kriminelle Zwecke aus. Unverzichtbare Eigenschaften wie Hilfsbereitschaft, Vertrauen und Respekt vor Autoritäten werden gezielt missbraucht.
Angst wird für Social Engineering genutzt. Aufgrund ihrer starken emotionalen Wirkung setzt Angst die Fähigkeit zum kritischen Denken herab. Dies erleichtert die von den Cyberkriminellen angestrebte Manipulation.
Für Unternehmen besonders relevant sind langfristig angelegte Social Engineering Angriffe auf strategisch wichtige Mitarbeiter. Dabei kann es sich z. B. über einen vermeintlichen Privatkontakt handeln, in dessen Rahmen zunehmend sensible Unternehmensinformationen zur Sprache kommen. Wird die angegriffene Person misstrauisch oder verliert das Interesse, kann eine Erpressung anhand bereits preisgegebener Informationen oder vertraulicher Daten folgen.
Theoretisch begegnet es Ihnen immer, wenn Sie die Identität eines Gesprächspartners nicht zweifelsfrei bestätigen können – ob am Telefon, per E-Mail oder in privaten Nachrichten.
Social Engineering refers to interpersonal manipulation used by cybercriminals to gain access to computer systems and sensitive data. The term originates from English and combines “social” (interpersonal) and “engineering” (construction), meaning the deliberate construction of an interpersonal relationship.
The principle behind social engineering isn’t new. In everyday life, it’s often referred to as fraud or scamming. However, digital media have opened up new possibilities for criminals:
Through digital platforms like company websites, blogs, or social media pages, cybercriminals can gather detailed information about an organization. They may then convincingly impersonate:
Employees
IT administrators
Even executives (e.g., in so-called CEO fraud)
On social media, attackers may create fake identities to build relationships with targets such as executives. Under the guise of friendship or romantic interest, they aim to manipulate the victim into revealing confidential business information.
Social engineering often exploits human strengths for malicious purposes. Traits like helpfulness, trust, and respect for authority are deliberately abused.
Examples:
An attacker claims to be a friend of a colleague and sends a document (e.g., a job application) for review. That document contains malware such as trojans, ransomware, or keyloggers.
An attacker poses as a superior under time pressure and demands the urgent transfer of a large amount of money to a specific account.
Fear is another powerful tool in social engineering. Because it impairs critical thinking, it helps attackers manipulate their victims.
Examples:
In CEO fraud, negative professional consequences are threatened if “instructions” are not followed.
In extortion attempts, cybercriminals claim to possess compromising photos or videos. Victims are told to comply with demands to avoid public exposure.
Criminals may impersonate police officers and demand fines for alleged offenses, such as illegal downloads.
For businesses, long-term social engineering attacks targeting strategically important employees are particularly dangerous. This could involve a fake personal connection that gradually draws out sensitive business information. If the victim becomes suspicious or disengaged, attackers may use the already disclosed data for blackmail.
In theory: any time you cannot confidently verify someone’s identity—whether by phone, email, or private message—you may be exposed to social engineering.
Use your everyday instincts—even online. Unusual questions, strange requests, suspicious stories, or a general “off” feeling are red flags regardless of the communication channel.
Never share passwords or confidential information by phone.
Ask follow-up questions: e.g., full name, callback number, or even mention fictitious people to test them (like a made-up colleague or spouse).
Don’t let yourself be pressured. Whether by urgency, secrecy, flattery, or threats—these are all tactics designed to cloud your judgment. Create space to think clearly before reacting.
Verify the person’s identity using a trusted and neutral channel. For example, call your company’s main switchboard and ask to be transferred to the person by name. If the person doesn’t exist, you’ll know.
Raise awareness across your organization about how social engineering works and how to respond. Encourage employees to question unusual requests. Make sure management supports these verifications—they can prevent major damage.
Prepare for incidents. Develop response plans for successful social engineering attacks, including both technical measures and social protocols—like secure, confidential reporting options for staff who are being blackmailed or coerced.
If you suspect you were the target of a social engineering attack, notify your company’s relevant departments immediately. It may be the sign of an Advanced Persistent Threat—a multi-stage, targeted attack involving other methods like spam, keyloggers, or ransomware. Your report could be crucial to preventing further damage.
Kontaktieren Sie uns.
Unser Team ist für Sie da!
Telefon: +49 30 95 999 8080
E-Mail: info@perseus.de
© 2025 Perseus Technologies GmbH. All rights reserved