No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

Social Engineering Adds Depth to Red Team Exercises

June 28, 2023
in Protection
0
Social Engineering Adds Depth to Red Team Exercises



When Alethe Denis conducts a social engineering attack as part of a red team exercise, the Bishop Fox security consultant often presents the targets with the exact email template that her team intends to use — such as a dress-code missive from human resources — and yet, the attack almost always succeeds.

“They’ve literally seen the email template, and I’ve highlighted the fact in my training that HR-based pretexts are extremely common and incredibly successful — ‘here’s an example of a dress-code email template,'” she says. “And they go, ‘yes, yes, yes.’ And then, on the day that I send the campaign, at least one person clicks.”

Pretext attacks and phishing have taken off as attackers have come to rely on them as an effective approach to compromising businesses, with about one in every six attacks including a social engineering component, according to the recently released Verizon Data Breach Investigations Report (DBIR). For that reason, social engineering has also become a necessary part of red team exercises and penetration tests and more providers are expanding their service offerings. Bishop Fox, for example, announced on June 28 that the firm had expanded its red team offerings to include social engineering attack emulation, more in-depth reporting on human-focused attacks, and the ability for customers to “ride along” to both learn from and oversee any exercises.

The goal is not only to show the potential threat that the social engineering vector poses for initial access, but to highlight how companies can react effectively following a successful attack, consultant Denis says.

“We don’t rely simply on testing humans when we’re conducting social engineering,” she says. “Our goal is to understand the weaknesses and then make recommendations that would allow the organization to put technical controls in place to prevent phishing and social engineering.”

The shift is another way that today’s red team engagements and penetration testing differ from those a decade ago. Consultants are more focused on emulating the attackers, not just outfoxing the defenders and finding the easiest way to a business’ crown jewels. In addition, penetration testing is more integrated with other security tools, such as those used by security operations centers and application security teams. And, because more companies have grown accustom to crowdsourcing, penetration-testing services now offer more frequent engagements.

Understanding the Impact of Social Engineering

By including social engineering in a penetration-testing engagement, companies gain the opportunity to learn about specific weak points in their training and environment, such as lax security protocols and a lack of security awareness among employees, says Chris Scott, managing partner at Unit 42 at Palo Alto Networks.

“These tests are more than just seeing if an attack could succeed, but also to discover how it could succeed within your environment,” he says, adding: “Social engineering is part of the early phases of an attack, and being able to detect and respond to these attacks is key to limiting their impact.”

Attackers continue to gather more passive intelligence on their targets, prior to an attack, according to experts. While a penetration test can help you discover easily exploitable vulnerabilities, focusing on social engineering tactics will make it that much harder for an attacker to succeed, says Andrew Obadiaru, chief information security officer at crowdsourced pentesting service Cobalt.

“Threat actors understand what motivates people to enter their credentials, reply to an email, or click a link,” he says. “Mitigating endpoint security such as social engineering is important, because it shows how people react to urgent situations and whether or not they are willing to disclose personal or intellectual information.”

Purple Is the New Black

The ultimate reason to add social engineering to a red team exercise or penetration-testing engagement is to allow companies to uncover the unexpected ways that an attacker could parlay a simple email message into a significant compromise. Conducting tabletop exercises internally has its limits, says Erich Kron, a technical evangelist at KnowBe4, a security awareness firm.

“Testing yourself for vulnerabilities is a lot like grading your own homework, so it is important to have an outside view and approach to finding vulnerabilities in your organization,” he says.

Kron adds that the “purple team” approach — where penetration testers, or red teams, work with the internal security team, or blue team — is critical.

“A penetration test that provides the organization with a list of vulnerabilities is far less useful than coordinating with the defensive team so they understand the vulnerabilities and how to mitigate them,” he says.

Overall, companies need to make sure that their security operations can respond in the right way to a successful social engineering attack and find ways to prevent the initial compromise. Putting rules in the browser that prevent people from visiting newly registered domains and rolling out multifactor authentication are two good ways for businesses to harden their IT environments against social engineer, Bishop Fox’s Denis says.

“Regimented compliance-driven phishing exercises are great to support training efforts and security awareness training to help individuals identify when they’re being manipulated,” she says. “But, while they’re great for training purposes, they should not be relied upon for protection of the organization against social engineering.”

Editorial Team

Editorial Team

Related Posts

You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It's on Sale for Over $200 Off
Protection

You Should Start Spring Cleaning With This Dyson Cordless Vacuum While It’s on Sale for Over $200 Off

April 18, 2026
This Sony Portable Outdoor Speaker Is Almost 50% Off Just in Time for Summer
Protection

This Sony Portable Outdoor Speaker Is Almost 50% Off Just in Time for Summer

April 18, 2026
The EufyCam S3 Pro Camera Kit Is $150 Off Right Now
Protection

The EufyCam S3 Pro Camera Kit Is $150 Off Right Now

April 18, 2026
The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘Yellowstone’
Protection

The Best Books, Movies, Video Games, and Podcasts to Check Out After Watching ‘Yellowstone’

April 18, 2026
Gemini Can Now Create AI Images Using Your Own Photos and Videos
Protection

Gemini Can Now Create AI Images Using Your Own Photos and Videos

April 18, 2026
Yesterday's Bluesky Outage Was No Accident
Protection

Yesterday’s Bluesky Outage Was No Accident

April 18, 2026
Load More
Next Post
Biden touts ‘Bidenomics’ as antidote to failed trickle-down policies

Biden touts ‘Bidenomics’ as antidote to failed trickle-down policies

Popular News

  • The 10 best banks for college students in 2025

    The 10 best banks for college students in 2025

    0 shares
    Share 0 Tweet 0
  • US-Based Bitcoin ETFs Post Roughly $1B Inflows In Past Week: Report

    0 shares
    Share 0 Tweet 0
  • Grandad sets land speed record on steam-powered bike built in his shed

    0 shares
    Share 0 Tweet 0
  • Sorrell reels from ANOTHER profit alert as £430m is wiped off his S4 Capital stake

    0 shares
    Share 0 Tweet 0
  • ROSEN, RECOGNIZED INVESTOR COUNSEL, Encourages Customers Bancorp, Inc. Investors to Secure Counsel Before Important Deadline in Securities Class Action First Filed by the Firm

    0 shares
    Share 0 Tweet 0

Latest News

Pi Network highlights verified users as key strength in ecosystem growth

Pi Network highlights verified users as key strength in ecosystem growth

April 19, 2026
0

The Pi Network Core Team has outlined its position on user growth, stating that verified identities play a central role...

Sr. Associate Director, Alumni Career Engagement

Sr. Associate Director, Alumni Career Engagement

April 19, 2026
0

The Sr. Associate Director for Alumni Career Engagement will oversee a functional area of alumni relations for...

New Bulgarian coalition claims victory, Radev’s path to PM requires talks

New Bulgarian coalition claims victory, Radev’s path to PM requires talks

April 19, 2026
0

The New Bulgarian Coalition, led by former President Rumen Radev’s Progressive Bulgaria party, is claiming victory in Bulgaria’s April 19...

Investors brace for renewed volatility after this weekend’s Iran developments

Investors brace for renewed volatility after this weekend’s Iran developments

April 19, 2026
0

After a three-week-long rally that’s brought the S&P 500 to new record highs, investors are again bracing for uncertainty following...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.