top of page
griffin jd.jpg

PROJECT: SOCIAL ENGINEERING

YOU MAY SHARE THIS PUBLIC DOCUMENT

 

In many of the knocks-and-scams and other warning projects SSS posts, we refer to "social engineering".

It is important to understand what this refers to and what dangers it holds.


Social engineering is a tactic cybercriminals use to trick people into giving away personal information or performing actions that compromise their own security. Instead of hacking into systems using technical means, social engineers use psychological manipulation to deceive individuals into divulging confidential information or carrying out specific tasks.

 

HOW SOCIAL ENGINEERING WORKS:

  • Pretending to be Someone Trustworthy:

    • The attacker might pose as a trusted figure, such as a bank or religious representative, colleague, or friend.

  • Creating a Sense of Urgency:

    • They often create a situation that makes the victim feel pressured to act quickly, such as claiming an urgent problem with their bank account.

  • Exploiting Human Emotions:

    • Social engineers rely on emotions like fear, curiosity, or sympathy to convince their target to take action.

  • Using Familiar Information:

    • They might use details they have learned about the person from social media or previous interactions to make their story more credible.

 

CRIMES RELATED TO SOCIAL ENGINEERING: 


  • Identity Theft:

    • Phishing: Criminals obtain personal information like ID numbers, birthdates, and addresses to impersonate victims and commit fraud.

    • Pretexting: Fraudsters create false scenarios to obtain information such as bank account details or identification numbers.

  • Financial Fraud:

    • Bank Fraud: Attackers trick victims into providing bank account details or login credentials, allowing unauthorised access and theft of funds.

    • Credit Card Fraud: Criminals obtain credit card information through deceptive means and make unauthorised purchases.

  • Corporate Espionage:

    • Business Email Compromise (BEC): Attackers pose as company executives or partners to manipulate employees into transferring company funds or sensitive information.

    • Spear Phishing: Targeted attacks on specific employees to gain access to corporate secrets or financial data.

  • Malware Distribution:

    • Baiting: Criminals leave infected devices, like USB drives, in public places, hoping someone will use them and inadvertently install malware on their systems.

    • Phishing: Emails containing malicious links or attachments that, when clicked, download malware onto the victim's device.

  • Ransomware Attacks:

    • Phishing: Attackers trick victims into downloading ransomware that encrypts their data, which is then held hostage until a ransom is paid.

  • Telecommunication Fraud:

    • Vishing (Voice Phishing): Criminals call victims pretending to be from legitimate organisations (like banks, churches or government agencies) to extract personal information or financial data.

    • Smishing (SMS Phishing): Similar to phishing, but conducted through SMS, where victims are tricked into clicking on malicious links or providing sensitive information.

  • Social Media Exploitation:

    • Catfishing: Creating fake identities to establish relationships with victims to gain personal information or financial benefits.

    • Profile Cloning: Duplicating social media profiles to trick the victim's friends and family into sharing information or sending money.

  • Healthcare Fraud:

    • Pretexting: Attackers pose as healthcare providers or insurers to obtain personal health information for fraudulent use.

    • Phishing: Targeting healthcare professionals or patients to gain access to medical records and billing information.

  • Government Benefit Fraud:

    • Impersonation: Using stolen identities to apply for government benefits such as unemployment, social security, or tax refunds.

  • Tech Support Scams:

    • Pretexting: Fraudsters pose as tech support representatives from well-known companies to gain remote access to victims' computers, steal information, or demand payment for fictitious services.

 

Social engineering relies on human psychology rather than technical hacking skills.


By understanding the tactics used by social engineers and being cautious about sharing personal information,

you can protect yourself from these manipulative attacks.


Always verify the identity of anyone asking for sensitive information, be sceptical of unsolicited requests,

and think twice before clicking on links or downloading files from unknown sources.

 

Specialised Security Services' Cybercrime Unit specialises in deciphering the scams mentioned above.


If you suspect that you have been a victim of any of these scams, contact Mr Mike Bolhuis for help

from the SSS Cybercrime unit immediately.

 

Specialised Security Services invites the public to the Mike Bolhuis Daily Projects WhatsApp Group.

This group is important in delivering insights into the latest crime trends, awareness, warnings and the exposure of criminals.


HOW TO JOIN THE MIKE BOLHUIS DAILY PROJECTS WHATSAPP GROUP:

 
CONTACT MR MIKE BOLHUIS FOR SAFETY AND SECURITY MEASURES, PROTECTION, OR AN INVESTIGATION IF NEEDED.

ALL INFORMATION RECEIVED WILL BE TREATED IN THE STRICTEST CONFIDENTIALITY AND EVERY IDENTITY WILL BE PROTECTED.
 

Regards,

Mike Bolhuis

Specialist Investigators into

Serious Violent, Serious Economic Crimes & Serious Cybercrimes

PSIRA Reg. 1590364/421949

Mobile: +27 82 447 6116

Fax: 086 585 4924

Follow us on Facebook to view our projects -


EXTREMELY IMPORTANT: All potential clients need to be aware that owing to the nature of our work as specialist investigators there are people who have been caught on the wrong side of the law - who are trying to discredit me - Mike Bolhuis and my organisation Specialised Security Services - to get themselves off the hook. This retaliation happens on social media and creates doubt about our integrity and ability. Doubt created on social media platforms is both unwarranted and untrue. We strongly recommend that you make up your minds concerning me and our organisation only after considering all the factual information - to the exclusion of hearsay and assumptions. Furthermore, you are welcome to address your concerns directly with me should you still be unsatisfied with your conclusions. While the internet provides a lot of valuable information, it is also a platform that distributes a lot of false information. The distribution of false information, fake news, slander and hate speech constitutes a crime that can be prosecuted by law. Your own research discretion and discernment are imperative when choosing what and what not to believe.


STANDARD RULES APPLY: Upon appointment, we require a formal mandate with detailed instructions. Please take note that should you not make use of our services – you may not under any circumstance use my name or the name of my organisation as a means to achieve whatever end.


POPI ACT 4 of 2013 South Africa: Mike Bolhuis' "Specialised Security Services" falls under Section 6 of the act. Read more here: https://mikebh.link/fntdpv

 
SSS TASK TEAM:
 
 

Copyright © 2015- PRESENT | Mike Bolhuis Specialised Security Services | All rights reserved.


Our mailing address is:

Mike Bolhuis Specialised Security Services

PO Box 15075 Lynn East

Pretoria, Gauteng 0039

South Africa

Add us to your address book


THIS PUBLIC DOCUMENT WAS INTENDED TO BE SHARED, PLEASE DO SO.

350 views0 comments

Comments


bottom of page