{"id":22279,"date":"2025-12-30T10:04:10","date_gmt":"2025-12-30T10:04:10","guid":{"rendered":"https:\/\/www.synetis.com\/social-engineering\/"},"modified":"2026-05-11T12:05:02","modified_gmt":"2026-05-11T12:05:02","slug":"social-engineering","status":"publish","type":"page","link":"https:\/\/www.synetis.com\/en\/ssi-audit\/social-engineering\/","title":{"rendered":"Social Engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22279\" class=\"elementor elementor-22279 elementor-10198\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7832a80 e-flex e-con-boxed e-con e-parent\" data-id=\"7832a80\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3e4f659 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3e4f659\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c3605d1 elementor-widget elementor-widget-shortcode\" data-id=\"c3605d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/\" title=\"Accueil\">Accueil<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.synetis.com\/en\/ssi-audit\/\" title=\"SSI audit\">SSI audit<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u203a<\/span><span class=\"aioseo-breadcrumb\">\n\tSocial Engineering\n<\/span><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30325ff elementor-widget elementor-widget-heading\" data-id=\"30325ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Social Engineering<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05554ba elementor-widget elementor-widget-text-editor\" data-id=\"05554ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208d7a7 elementor-widget elementor-widget-text-editor\" data-id=\"208d7a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-208d7a7 elementor-widget elementor-widget-text-editor\" data-id=\"208d7a7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><div class=\"elementor-element elementor-element-bafb693 elementor-widget elementor-widget-text-editor\" data-id=\"bafb693\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\">Adopt an offensive and awareness-raising approach using social engineering.<\/div><div> <\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-897e4aa elementor-invisible elementor-widget elementor-widget-button\" data-id=\"897e4aa\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-audit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contact our teams<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c0162c2 e-flex e-con-boxed e-con e-parent\" data-id=\"c0162c2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a04d67 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"5a04d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assess your organization's resistance to social engineering scenarios<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7cca607 elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"7cca607\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45b8870 elementor-widget elementor-widget-text-editor\" data-id=\"45b8870\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Social engineering&#8221; consists in deceiving <strong>an employee&#8217;s vigilance<\/strong> in order to obtain sensitive information or to carry out malicious actions (opening files, scamming the president, etc.). Our auditors can adopt an offensive and awareness-raising approach, contextualizing their attacks (USB dropping, phoning, vishing, smsing, whatsapping, etc.). <\/p><p>In 2015, it was estimated that one in five employees had a tendency to plug in a &#8220;forgotten&#8221; or &#8220;gifted&#8221; USB flash drive. Without any precautions in advance, this behavior can be dangerous for a number of reasons, such as infection via ransomware or other means, use of the USB Killer device, etc. Synetis is able to create malicious USB sticks and then &#8220;abandon&#8221; them to trick employees.  <\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0ecbc4 e-con-full e-flex e-con e-child\" data-id=\"e0ecbc4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b97cba7 e-con-full e-flex e-con e-child\" data-id=\"b97cba7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-559bfa5 elementor-widget elementor-widget-heading\" data-id=\"559bfa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Test your organization's vigilance against phishing techniques<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e09e2ac elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"e09e2ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-45b8870 elementor-widget elementor-widget-text-editor\" data-id=\"45b8870\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p><strong> Phishing<\/strong> is a method widely used by attackers to detonate their malicious payloads directly on your organization&#8217;s network. This type of attack can also prompt users to <strong>log on to false authentication cre<\/strong> dentials in order to compromise secrets. <\/p><\/div><\/div><div class=\"elementor-element elementor-element-dff651f elementor-widget elementor-widget-text-editor\" data-id=\"dff651f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\">We can carry out social engineering campaigns using several vectors:<\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-638c3ea elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-invisible elementor-widget elementor-widget-icon-list\" data-id=\"638c3ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Phishing by e-mail (use of a domain name close to the company, such as typosquatting or \"forgotten\" domains) or telephone call;<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Phishing with booby-trapped USB keys ;<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Telephone calls to retrieve sensitive information (passwords, customer data, etc.).<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80cffb0 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"80cffb0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42c10d3 e-flex e-con-boxed e-con e-parent\" data-id=\"42c10d3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-342551a elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"342551a\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:400}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Phishing<\/strong> remains one of the<strong> main vectors of<\/strong> cybercrime. The aim of this type of attack is to get the recipient of an apparently legitimate e-mail to transmit bank details or login credentials (for example, to financial services in order to steal money). Phishing can be used in <strong>more targeted attacks<\/strong> to try to obtain an employee&#8217;s access credentials to professional networks for which he or she has rights, or to execute code contained in a malicious attachment.  <\/p><p><strong>Please do not hesitate to contact us to discuss how to carry out these campaigns.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b732b2 elementor-widget elementor-widget-menu-anchor\" data-id=\"8b732b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"contact-audit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3184f1f0 e-grid e-con-boxed e-con e-parent\" data-id=\"3184f1f0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-10492d99 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"10492d99\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14b0bf94 elementor-widget elementor-widget-deensimc-animated-word-roller\" data-id=\"14b0bf94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"deensimc-animated-word-roller.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"infinite-rotation-main-wrapper\">\n\t\t\t<h2 class=\"deensimc-infinite-rotation-container\">\n\t\t\t\t\t\t\t\t\t<span class=\"deensimc-fixed-text deensimc-infinite-rotation-heading\">\n\t\t\t\t\t\tAre you planning an audit?\t\t\t\t\t<\/span>\n\t\t\t\t\n\t\t\t\t<div class=\"deensimc-text-rotator-container\">\n\t\t\t\t\t<div class=\"deensimc-vertical-scroll-track\"\n\t\t\t\t\t\tdata-total-text=\"7\"\n\t\t\t\t\t\tdata-rotation-delay=\"3\"\n\t\t\t\t\t\tdata-visible-word=\"1\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tPentest\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tArchitecture\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tConfiguration\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tRed Team\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSocial Engineering\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tOrganizational and Physical\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotate-text\">\n\t\t\t\t\t\t\t\t\t<div class=\"deensimc-rotating-word\">\n\t\t\t\t\t\t\t\t\t\tSource code\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/h2>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<noscript>\n\t\t\t<div class=\"deensimc-noscript-notice\" role=\"note\">\n\t\t\t\tThis section requires JavaScript to load properly. Please enable JavaScript in your browser and reload the page.\t\t\t<\/div>\n\t\t<\/noscript>\n\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-145c9017 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"145c9017\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:400}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-be53a8d elementor-widget elementor-widget-hubspot-form\" data-id=\"be53a8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hubspot-form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t\t\t\t\t<script>\n\t\t\t\t\t\t\twindow.hsFormsOnReady = window.hsFormsOnReady || [];\n\t\t\t\t\t\t\twindow.hsFormsOnReady.push(()=>{\n\t\t\t\t\t\t\t\thbspt.forms.create({\n\t\t\t\t\t\t\t\t\tportalId: 26643307,\n\t\t\t\t\t\t\t\t\tformId: \"a4591422-7cbd-429d-8f24-693ff8ce4b4a\",\n\t\t\t\t\t\t\t\t\ttarget: \"#hbspt-form-1778687894000-9838099917\",\n\t\t\t\t\t\t\t\t\tregion: \"eu1\",\n\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t})});\n\t\t\t\t\t\t<\/script>\n\t\t\t\t\t\t<div class=\"hbspt-form\" id=\"hbspt-form-1778687894000-9838099917\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Synetis auditors adopt an offensive and awareness-raising approach, contextualizing their attacks (USB dropper, phoning, etc.).<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":22574,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-22279","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/comments?post=22279"}],"version-history":[{"count":3,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22279\/revisions"}],"predecessor-version":[{"id":22303,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22279\/revisions\/22303"}],"up":[{"embeddable":true,"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/pages\/22574"}],"wp:attachment":[{"href":"https:\/\/www.synetis.com\/en\/wp-json\/wp\/v2\/media?parent=22279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}