<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2253229985023706&amp;ev=PageView&amp;noscript=1">

back to HRMI

Social Engineering and Phishing: Scams You Need to Know About

Read Time 9 mins | 29 Apr 2026 | Written by: Nur Rachmi Latifa

Social Engineering and Phishing

In the face of rapid technological advancement, cybercrime threats continue to grow and have become a major concern for both individuals and organizations. One of the most commonly used fraudulent strategies is social engineering and phishing. These methods rely on psychological manipulation to deceive victims into disclosing sensitive information or taking actions that benefit the attacker. As these techniques become increasingly sophisticated, it is essential to recognize and understand their various tactics in order to protect ourselves from the risks they pose.

What is Social Engineering?

Social engineering is a psychological manipulation technique used by cybercriminals to obtain information, access, or specific actions from their targets without their awareness. This method often exploits human traits such as trust, the willingness to help, or fear to deceive victims. Attackers typically impersonate trusted parties—such as coworkers, customer service representatives, or even official authorities—to make targets feel safe or pressured into sharing sensitive information.

Common examples of social engineering include fraudulent phone calls claiming to be from a bank requesting account verification, phishing emails that prompt users to click malicious links, or text messages asking for One-Time Passwords (OTP). Even physical tactics like “tailgating,” where an attacker gains access to restricted areas by following someone in, fall under this category.

According to an article from Bisnis.com, social engineering attackers often take advantage of moments of unpreparedness or urgent situations to increase their chances of success. Therefore, it is crucial to remain cautious and avoid trusting requests for sensitive information without verifying the identity of the requester. Raising awareness of these tactics is a key first step in protecting yourself from potential risks.

Read: Behavioral Science Helps Understand Employee Vulnerability to Phishing

What is Phishing?

Phishing is a form of fraud that uses digital techniques to steal personal information, such as login credentials, credit card numbers, or other sensitive data. In these attacks, perpetrators typically impersonate trusted entities and trick victims into providing information through malicious links, attachments, or direct communication. The main objective of phishing is to exploit trust and take advantage of human negligence. Phishing comes in several forms, including:

Email Phishing

This is the most common type, where attackers send fake emails that appear to come from legitimate organizations such as banks, technology companies, or popular online services. These emails often contain urgent messages prompting victims to update their accounts, verify their identity, or avoid threats like account suspension. When victims click on the link, they are redirected to a fake website designed to steal login credentials or credit card information.

Spear Phishing

Unlike generic email phishing, spear phishing targets specific individuals or organizations with highly personalized messages. Attackers often use previously gathered personal information to make the attack more convincing. For example, an email impersonating a company CEO may instruct a finance staff member to transfer funds to a specific account.

Smishing and Vishing

Smishing refers to phishing attacks conducted via SMS, where victims receive messages asking them to click a link or provide personal information. Vishing, on the other hand, is carried out through phone calls, with attackers pretending to be bank officers or company representatives to obtain sensitive data such as PINs or OTP codes.

The relationship between phishing and social engineering is very close, as both rely on human psychology to create trust, panic, or a sense of urgency. Social engineering serves as the underlying manipulation strategy, while phishing is a specific digital technique used to execute that manipulation. As these threats continue to evolve, understanding phishing and its various forms is essential to protect yourself from cybercrime.

Social Engineering Tactics and Techniques

Behind every social engineering attack lies a set of tactics designed to exploit a victim’s trust or lack of awareness. These techniques take advantage of psychological weaknesses or specific situations, enabling attackers to gain the information or access they seek. Here are some of the most commonly used social engineering methods:

Pretexting

In this technique, the attacker creates a fabricated scenario to gain the victim’s trust. They often impersonate someone with authority or a familiar connection, such as a bank officer, IT staff, or coworker. For example, the attacker may contact the victim under the pretense of verifying account details, when in reality the goal is to steal sensitive information.

Baiting

This method uses false incentives to lure victims. Attackers may offer free rewards, large discounts, or access to premium content in exchange for clicking a link or downloading a file. In many cases, the file contains malware that allows the attacker to gain access to the victim’s system.

Tailgating

This technique exploits physical security weaknesses to gain unauthorized access to restricted areas. Tailgating occurs when an attacker follows someone with legitimate access, such as an employee entering a secured door. The attacker may pretend to be a visitor or technician, relying on the victim’s reluctance to question or deny access.

Examples of Fraud Cases in Indonesia

In Indonesia, social engineering–based scams are quite common, with one of the most frequent involving pretexting techniques. For example, many victims report receiving phone calls from individuals claiming to be bank officers who ask for OTP (One-Time Password) codes to “confirm” transactions. In reality, these codes are used by attackers to gain unauthorized access to the victim’s account.

Another example involves baiting, such as fake job vacancy advertisements that lure victims into downloading malicious applications under the promise of employment opportunities. These apps often contain malware designed to steal data or compromise the victim’s device. Recognizing these techniques is the first step in protecting yourself from social engineering threats. Always stay cautious in suspicious situations and avoid sharing sensitive information without proper verification.

Phishing Strategies and Techniques

Phishing attacks have become one of the most common cyber threats, with attackers using various strategies and techniques to deceive victims. In many cases, these methods appear highly convincing, causing individuals to fall victim without realizing it. Below are some of the most frequently used phishing strategies:

Fake Email Delivery

Phishing attackers often send emails designed to mimic official messages from trusted institutions such as banks, technology companies, or government agencies. These emails typically use logos, formal language, and visual elements to appear authentic. They often include urgent instructions—such as updating account information or avoiding account suspension—to pressure victims into clicking malicious links.

URL Spoofing

One of the key tactics in phishing attacks is the use of fake links that closely resemble legitimate domains. For example, an attacker might use a domain like “bank-indon3sia.com,” which looks very similar to “bank-indonesia.com.” When victims click on these links, they are redirected to fake websites designed to steal login credentials or other sensitive information.

Fake Online Forms

This technique involves creating fraudulent login pages that closely resemble legitimate portals. When victims enter their credentials, the information is immediately captured by the attacker. These fake forms are often used in combination with phishing emails or spoofed links, making the attack more difficult to detect.

Examples of Phishing Cases in Indonesia

Phishing cases in Indonesia frequently involve impersonation of banking institutions. One common example is an email that appears to come from a well-known bank, asking customers to “update their security information” through a provided link. The link leads to a fake website designed to closely resemble the bank’s official login page. Once the victim enters their credentials, the attacker can access the account and perform unauthorized transactions.

Another commonly used strategy is SMS-based phishing (smishing), where victims receive text messages containing links to claim rewards or check transaction statuses. These messages are crafted to create urgency or curiosity, increasing the likelihood that victims will click the link. By understanding these techniques, both individuals and organizations can improve their awareness of phishing threats and better protect their sensitive information.

Impact of Social Engineering and Phishing

Social engineering and phishing attacks are not just ordinary cyber threats—their impact can be devastating for both individuals and organizations. The manipulation and deception techniques used by attackers often lead to significant consequences that go beyond financial loss. Here is a detailed look at how these attacks affect victims:

Impact on Individuals

For individuals, social engineering and phishing attacks can result in substantial financial losses. Attackers often target sensitive banking information, such as account numbers or OTP codes, using manipulative tactics. As a result, funds can be stolen from victims’ accounts without their awareness.

Additionally, these attacks create opportunities for identity theft. Stolen personal data—such as national ID numbers or social media account information—can be misused for illegal activities, including further fraud, creating fake accounts, or applying for online loans under the victim’s name.

Impact on Organizations

For organizations, these attacks can lead to the loss of highly valuable sensitive data, such as business strategies, client information, or confidential documents. Such data breaches not only cause financial damage but also pose serious strategic risks. Moreover, a company’s reputation is at stake.

When customer data or internal information is compromised, public trust can quickly erode, requiring significant time and resources to rebuild. In some cases, organizations may also face regulatory penalties or legal actions due to failure in adequately protecting data.

How to Prevent Social Engineering and Phishing

Protecting yourself from social engineering and phishing requires a combination of awareness, technology, and safe practices. The following steps can help both individuals and organizations reduce the risk of these attacks:

Awareness and Education

Raising awareness is the first and most critical step. Organizations should regularly conduct security awareness training to help employees recognize signs of phishing or social manipulation. For example, emails that request sensitive information with urgency, contain suspicious links, or come from unusual sender addresses are key indicators of phishing. Education should also emphasize the importance of verifying any request for sensitive information—even if it appears to come from a trusted source.

Technology Security

Adopting the right technology is an effective preventive measure. Firewalls and anti-phishing software can help detect and block threats before they reach users. Additionally, implementing multi-factor authentication (MFA) adds an extra layer of security, ensuring that access requires not only a password but also additional verification such as OTP codes or biometric authentication.

Identity Verification

Whenever you receive a request for sensitive information or specific actions, always verify its authenticity by contacting the official institution directly. For example, if you receive an email or phone call from a bank requesting an OTP, confirm it through the bank’s official contact channels. Never share sensitive information without proper verification.

Safe Online Practices

Practicing safe behavior online is equally important. Avoid clicking on suspicious links or those from unknown sources. Before entering sensitive information, ensure that the website URL is legitimate and uses a secure protocol (https). This helps reduce the risk of being redirected to fraudulent sites designed to steal personal data.

By combining awareness, technology, and proactive measures, the risks of social engineering and phishing can be significantly minimized. Proper prevention not only protects personal and organizational data but also helps avoid greater losses in the future.

Challenges in Combating Social Engineering and Phishing

Fighting social engineering and phishing is becoming increasingly difficult due to several key challenges. Fraud techniques continue to evolve, with attackers leveraging advanced technologies such as artificial intelligence to create emails, websites, and messages that are nearly indistinguishable from legitimate ones. This makes detection much harder, even for cautious users.

Another major obstacle is the low level of public awareness. Many individuals still lack understanding of social engineering and phishing tactics, making them more vulnerable to attacks. Limited education and training in information security—especially in workplace environments—mean that people often fail to recognize warning signs or do not know how to respond when faced with suspicious situations.

Limitations in law enforcement and technology also play a role. Attackers often operate across borders or use methods that are difficult to trace, complicating legal action. At the same time, despite technological advancements, no system can fully prevent these attacks—primarily because human behavior remains the weakest link in cybersecurity. Addressing these challenges requires a comprehensive approach, including improving public awareness, strengthening regulations, and developing more effective technologies to detect and prevent attacks.

Read: Types and Examples of Phishing Emails Commonly Used by Scammers

Conclusion

Understanding social engineering and phishing as serious threats in today’s rapidly evolving technological landscape is a crucial step toward improving awareness and protection against cybercrime. These psychological manipulation and digital deception techniques target not only individuals but also organizations, making them a significant concern. Through proper education and training, both individuals and organizations can recognize these attack methods and take the necessary preventive measures to safeguard personal data and critical assets.

Addressing these threats cannot be done individually. It requires collaboration between society, businesses, and governments to create a safer digital environment. Organizations must strengthen their security systems, individuals need to stay vigilant, and governments should enforce strong regulations while supporting technological advancements. With a collective effort, the risks of social engineering and phishing can be minimized, leading to a more secure cybersecurity landscape for everyone.

One-Stop Solution to Manage Employee Cybersecurity Simply & Automatically

Nur Rachmi Latifa

A writer who focuses on producing content related to Cybersecurity, Privacy, and Human Cyber Risk Management.

WhatsApp Icon Mira