Social Engineering Incident Types
Social Engineering Incident Types
Different attack types require tailored responses:
Phishing Credential Compromise: When employees provide credentials to phishing sites:
- Immediately reset compromised passwords
- Check for account access and data exfiltration
- Review email rules and forwarding settings
- Scan for malware if links were clicked
- Identify other employees who received similar emails
- Block phishing domains at perimeter
Business Email Compromise Response: For successful BEC/wire fraud:
- Contact receiving banks immediately (within 24-48 hours critical)
- File complaint with IC3.gov
- Notify law enforcement
- Preserve all communications
- Review financial controls
- Check for additional fraudulent requests
Vishing/Pretexting Success: When attackers gain information through phone calls:
- Document exactly what information was disclosed
- Assess potential misuse scenarios
- Implement additional authentication for affected processes
- Alert other potential targets
- Review call recordings if available
- Update verification procedures
Physical Breach Response: For successful physical intrusion:
- Review access logs and camera footage
- Identify what areas were accessed
- Check for installed devices or missing items
- Re-secure affected areas
- Update access controls
- Alert security personnel