Social Engineering Types and Clues

Key Takeaways

  • Social engineering exploits human trust, pressure, curiosity, fear, helpfulness, or authority.
  • Phishing is broad, spear phishing is targeted, whaling targets senior leaders, smishing uses SMS, and vishing uses voice.
  • Pretexting creates a believable story; baiting offers something tempting; tailgating abuses physical access.
  • Business email compromise often manipulates payment, invoice, payroll, or gift card workflows.
  • Best responses usually combine verification procedures, user reporting, technical controls, and process controls.
Last updated: April 2026

Social Engineering Types and Clues

Social engineering questions are clue-based. The attacker may not need malware if a person can be convinced to click, approve, reveal, pay, or open a door.

TechniqueDefinitionStrong clue
PhishingDeceptive message to many recipientsBroad email with link or attachment
Spear phishingTargeted phishingMessage tailored to a team or person
WhalingTargeting senior leadersCEO, CFO, executive assistant
SmishingSMS or messaging lureText message with urgent link
VishingVoice-based deceptionPhone call impersonation
PretextingFabricated story to gain trustFake auditor, fake IT support, fake vendor
BaitingEntices with something desirableFree gift card, found USB drive
TailgatingFollowing someone into a secure areaPerson slips in behind employee
Shoulder surfingObserving secrets physicallyWatching password or PIN entry
Dumpster divingSearching trash for informationPrinted records or notes discarded

Persuasion Clues

Pressure tacticWhat it sounds like
Urgency"This must be done in the next 10 minutes."
Authority"The CEO approved this."
Fear"Your account will be closed."
Scarcity"Only the first users get access."
Familiarity"I worked with your manager last week."
Helpfulness"I just need you to bypass the process this once."

Business Email Compromise Pattern

Business email compromise often targets a process, not just a login. Watch for invoice changes, wire transfer requests, payroll direct deposit changes, gift card requests, or vendor banking updates. The best mitigation is usually an out-of-band verification procedure plus email security controls and user reporting.

ScenarioMost specific answer
CFO receives tailored fake acquisition invoiceWhaling or BEC
Employee gets SMS claiming package delivery problemSmishing
Caller pretends to be IT and asks for MFA codeVishing plus pretexting
Attacker leaves branded USB drives in lobbyBaiting
Person carrying boxes follows employee through doorTailgating

Trap Callout: The Channel Matters

If the lure arrives by SMS, choose smishing. If it is a phone call, choose vishing. If the target is an executive, whaling may be the more specific answer. If the story is the key feature, pretexting may be the best label.

Scenario Walkthrough

An employee receives a phone call from someone claiming to be from the service desk. The caller says a security update failed and asks the employee to read back an MFA code. The channel is voice, so vishing applies. The invented service desk story is pretexting. The right response is to refuse to share the code, hang up, contact the service desk through an approved channel, and report the attempt.

Quick Drill

ClueAnswer
Generic email to thousandsPhishing
Customized email to payroll clerkSpear phishing
Customized email to CFOWhaling
Text message with malicious linkSmishing
Phone call asking for credentialsVishing
Fake story to build trustPretexting
Test Your Knowledge

A caller claims to be from IT and asks a user to read back an MFA code to complete a security update. Which social engineering type is most directly tied to the communication channel?

A
B
C
D
Test Your Knowledge

An attacker sends a tailored payment request to the CFO using details from a current vendor relationship. Which label is most specific?

A
B
C
D
Test Your KnowledgeMulti-Select

Which are common clues of social engineering? Choose three.

Select all that apply

Urgency
Authority claim
Request to bypass normal process
Properly segmented database tier