Pretexting
Attacker creates a fabricated scenario to manipulate or deceive someone into divulging confidential information
Diversion Theft
Manipulating a situation or creating a distraction to steal valuable information
e.g. DNS Spoofing Attack
Hoax
Malicious deception that is often spread through social media and other communication
Mostly paired with Phishing Attacks and Impersonation Attack
Shoulder Surfing
Looking over someone’s shoulder to gather personal information
Dumpster Diving
Searching through trash to find valuable information
Digital dumpster diving going through deleted files on disk
Eavesdropping
Secretly listening to private conversations
e.g. MITM, Wire taps
Baiting
Planting a malware-infected device for a victim to find and unintentionally infect a system
Piggybacking & Tailgating
Often used by insiders to access offices and restricted area without leaving any track
Piggybacking
Person with authorized access allows another person without authorization to enter an secure area with them
Tailgating
Unauthorized person follows someone with legitimate access to a secure space without their knowledge or consent