Cybersecurity Reference > Glossary
What is Social Engineering?
Instead of finding flaws in code or cracking encryption, attackers use deception, persuasion, and psychological manipulation to trick authorized users into handing over access or credentials. The approach works because humans remain the weakest link in most security architectures—even the most hardened systems become vulnerable when someone on the inside can be fooled into opening the door.
The techniques vary widely in sophistication. Phishing emails represent the high-volume, low-effort end of the spectrum: mass messages impersonating trusted brands or colleagues, hoping that some percentage of recipients will click a malicious link or download infected attachments. These require minimal skill but succeed through sheer volume and the law of averages. More targeted approaches, sometimes called spear phishing, research specific individuals or organizations to craft more convincing lures. At the sophisticated end, attackers might spend weeks researching a company, building rapport with employees over the phone, and constructing elaborate pretexts that make their requests for access seem entirely reasonable. A friendly voice claiming to be locked out of their account, dropping the right names and demonstrating knowledge of internal systems, can persuade a help desk worker to reset credentials without following proper verification procedures. No malware required—just confidence, preparation, and an understanding of human psychology.
Origin
Before the internet age, these techniques were called "pretexting" or simply fraud. Phone phreaks in the 1970s used similar methods to manipulate telephone company employees into revealing technical details about switching systems. The approach worked then for the same reason it works now: most people want to be helpful, especially when someone seems to have legitimate authority or genuine need.
As digital systems became more hardened against technical attacks, social engineering grew more attractive to malicious actors. Why spend months looking for a zero-day vulnerability when you can spend twenty minutes on the phone convincing someone to email you a password? The digitization of everything has actually expanded the surface area for these attacks—more communication channels, more complexity in verifying identity, and more overworked employees managing access to critical systems.
Why It Matters
Business email compromise represents one of the most financially damaging forms. Attackers impersonate executives or vendors, often after compromising a legitimate email account, and request wire transfers or sensitive data. These scams have cost organizations billions, with individual incidents sometimes reaching tens of millions of dollars. The emails often arrive at exactly the right moment—during known business processes, when payments are expected—making them hard to distinguish from legitimate requests.
Deepfake technology has opened new frontiers. Voice synthesis can now convincingly mimic executives or colleagues, adding a layer of apparent authenticity to phone-based attacks. Video deepfakes, while still detectable by careful observers, continue improving. The tools for creating these have become accessible enough that sophisticated nation-state capabilities are no longer required.
The human element cuts both ways. Training helps, but relying solely on user awareness is unrealistic. People make mistakes, especially when stressed, distracted, or facing urgent requests from apparent authority figures. Effective defense requires both technical controls that make social engineering harder to execute and cultural changes that make verification standard practice rather than paranoid exception.
The Plurilock Advantage
Our team includes former intelligence professionals who understand how these attacks actually work in practice, not just in theory.
We identify which of your people, processes, and controls are vulnerable before real attackers do, then help you build defenses that account for human fallibility rather than assuming it away. Learn more about our social engineering testing services.
.




