How We Break Into Companies (So You Can Stop Us)
LevelBlue Completes Acquisition of Cybereason. Learn more
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Cybereason. Learn more
When most people think of cybersecurity breaches, they imagine hackers cracking passwords or exploiting vulnerabilities. In reality, the weakest link in any security program is often the human element. As a Cybersecurity Consultant who’s delivered on Offensive Security engagements involving remote and physical social engineering, I’ve walked into buildings without a badge, tricked users into clicking on seemingly benign emails, and convinced employees to let me access their Point-of-Sale systems and workstations to execute malicious payload under the guise of performing updates – all with permission.
These assessments are designed to simulate real-world attacks. What I’ve learned over time is that even organizations with robust technical defenses can fall victim to a simple social engineering attack when they fail to build a culture of skepticism and verification.
I’ll share some key observations from the field and, more importantly, offer practical recommendations on how to strengthen your organization’s defenses against social engineering threat vectors.
Common Observations from the Field
No matter the industry or size of the company, people are generally helpful by nature. It’s part of what makes us human, and attackers know this. Whether it’s holding the door open for a stranger or clicking a link that appears to come from a colleague, these small actions can lead to big breaches.
A surprising number of organizations believe they’re immune to attacks because they’re small or don’t handle highly sensitive data. But attackers don’t always target specific companies, they often exploit whoever gives them the easiest way in. In several engagements, I’ve seen smaller businesses successfully compromised through phishing or impersonation, only to be used as stepping stones to access their larger, more security-mature targets.
While many organizations have identity verification policies in place, such as requiring ID checks for vendors or visitors, the actual implementation is often superficial. In several engagements, I presented fake identification that passed inspection simply because it appeared legitimate and I acted with confidence. This highlights a broader issue: when employees aren't trained to thoroughly scrutinize credentials or feel uncomfortable challenging a human threat vector who “seems” legitimate, even basic security controls can fail.
Tailgating, propped-open doors, unattended reception desks, and misplaced trust in uniforms or clipboards are all vulnerabilities I’ve exploited. Many organizations assume their building security is solid, but physical entry can be surprisingly easy without the right controls. In one engagement, I entered a building simply because a rug had been placed in the doorway, preventing the magnetic lock from engaging. In another, I claimed to be an IT vendor and coincidentally arrived when the client was expecting someone. They didn’t ask for ID or verify anything before letting me in to roam freely.
Annual training modules and posters in the break room won’t stop a convincing attacker. If users aren't empowered to question suspicious behavior or escalate concerns, then even the best training won’t help.
In some cases, I’ve found physical keys stored in plain sight near the locks they control, or passwords written and posted near terminals. These oversights undermine even the best security systems.
Case 1: The “Network Vendor”
I arrived onsite claiming to be from a well-known networking company there to perform a routine maintenance check on the data center. Without verifying my credentials or confirming with their IT team, the staff granted me access to the server room with no escort, no questions asked.
Lesson: Physical access to critical infrastructure should never be granted without strict validation, clear approval workflows, and an escort policy, regardless of how routine the request may seem.
Lesson: Every access request needs a validation process that cannot be bypassed with confidence or urgency.
Case 2: The USB Trap
I left labeled USB drives inside customer office spaces. Employees plugged them in, triggering a payload that reported back to my Command and Control (C2) server, showing how easily curiosity can bypass security.
Lesson: Train users to report suspicious media and enforce technical restrictions on USB devices.
Case 3: Tailgating Success
Dressed in business casual with a badge lanyard (from another company), I followed employees into the office. No one challenged me.
Lesson: Train staff to politely confront unknown individuals or route them to reception.
1. Layered Defense Strategy
2. Empower Your Employees
3. Tailored, Continuous Training
Remote Social Engineering involves phishing, vishing, smishing, and business email compromise. Defenses here rely heavily on:
Physical Social Engineering requires a different set of controls:
The companies that consistently stop us do three things:
Could your team spot a real social engineering attack? Let’s find out with a safe, controlled simulation that exposes vulnerabilities before criminals do. LevelBlue can help.
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.