Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Attack Types

Social Engineering

Psychological manipulation techniques used to deceive people into divulging confidential information, granting access, or performing actions that compromise security.

Definition

Social engineering is the broad category of attack techniques that exploit human psychology rather than technical vulnerabilities. Instead of compromising systems directly, attackers manipulate people — employees, help desk agents, executives, or customers — into taking actions that serve the attacker's objectives. These actions include revealing credentials, transferring funds, installing malware, or granting system access. Social engineering is the human layer of nearly every modern cyberattack.

Why It Matters

The majority of security breaches involve a human element. Technical controls — firewalls, endpoint detection, MFA — are consistently undermined when an attacker can convince a person to voluntarily bypass them. Social engineering is effective across every attack surface: email, phone (vishing), SMS (smishing), in-person, and through social media. Because it targets human cognition rather than software, it cannot be patched. Effective detection requires understanding the psychological patterns attackers exploit.

How It Works

Social engineering attacks are built on a small set of influence principles: authority (impersonating an executive, IT department, or regulator to compel compliance), urgency (creating artificial time pressure to prevent careful evaluation), scarcity (implying a limited window to act), social proof (fabricating consensus or shared context), and fear (threatening negative consequences for inaction). In phishing, these principles are embedded in email body content: subject lines containing URGENT or ACTION REQUIRED, body text referencing an overdue invoice, a suspended account, or a compliance deadline. Attackers combine these with a plausible sender identity and a contextually appropriate pretext to maximize the likelihood of compliance.

DFIR Platform

Phishing Email Checker

The DFIR Lab Phishing Email Checker includes social engineering pattern detection as part of its email body analysis. It identifies urgency language, authority impersonation indicators, financial lures, and fear-based manipulation patterns in email content, flagging messages that combine multiple influence techniques — a reliable indicator of phishing intent

View Documentation

Related Concepts

Phishing AnalysisSpear PhishingBusiness Email Compromise (BEC)Credential Harvesting

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free