Real-world examples

While it is important to understand the concept of social engineering and how threat actors perform reconnaissance, it is also important to explore how threat actors leverage social engineering in the real world:

  • Operation red alert: In 2017, a threat-actor group suspected to have their origin in Russia was contracted by a Brazilian telecommunication company to target a rival company based in Beijing. The rival company was known for their strong investments in information security, allowing the Security Operations Center (SOC) to have access to the latest technology, the best locally available talent, and strong internal security processes. During the recon phase, the threat actors had purchased bulk lists of compromised ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.