ABA Banking Journal
No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
SUBSCRIBE
ABA Banking Journal
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
No Result
View All Result
No Result
View All Result
Home Cybersecurity

Social Engineering: The Art of Human Hacking

April 29, 2016
Reading Time: 3 mins read

Online Security Concept - Fingerprint on Virtual Screen

By Monica C. Meinert

Each year, millions of dollars are lost to a type of fraud that’s particularly difficult to detect and stop, and it’s all based on a criminal’s ability to exploit a basic human characteristic: the tendency to trust.

It’s a practice called “social engineering,” in which a fraudster successfully manipulates a victim into taking specific actions like sending wire transfers or giving over confidential information while posing as a trustworthy source.

“Social engineering is fraud by deception,” says Mark Lowers, CEO of Lowers Risk Group, a firm based in Purcellville, Va. “It’s about playing on the average individual’s sense of decency.”

Social engineers use a variety of tactics to gain information that can help them win over the trust of their victims. Strategies can include sophisticated approaches like phishing or the tried-and-true methods of dumpster diving, pretext calling or impersonating a company employee or business associate. Once a social engineer has the information they need to appear legitimate, they can make contact with their victim and set the scheme into motion.

Virtually anyone can fall victim to a social engineering scam, but businesses in particular have seen an increase in this type of fraud over the past several years.

“[My] firm has handled dozens of cases this past year where very well-run organizations transferred big, six-figure numbers as a result of [social engineering scams],” Lowers says. “And they didn’t get it back—by the time they realized, the funds had been transferred on to multiple other banks.”

Email provides a particularly lucrative opportunity for social engineers—according to a 2014 study by McAfee, 97 percent of people globally were unable to correctly identify phishing emails. And the FBI reports that in the U.S. alone, there have been more than 7,000 victims and $747 million in losses as a result of business email compromise—a specific type of social engineering fraud—since 2013.

In business email scams, “fraudsters typically target businesses working with foreign suppliers or business that perform wire transfers or ACH transactions as payments,” often sending phony invoices or requests for payment, explains Kim Syrop, SVP and director of fraud and loss management for Webster Bank, a $22 billion institution based in Waterbury, Conn. To the person on the receiving end, these requests seem to come from a trusted vendor, which is how so many unsuspecting employees have been duped into facilitating fraudulent transactions.

In other cases, crooks will impersonate corporate CEOs, creating fake email addresses or hacking existing email accounts. From there, Syrop says, they typically reach out to a lower-level employee with wire origination authority and request a transfer of funds, often stressing confidentially. The employee naturally wants to comply with their boss’ wishes as quickly and efficiently as possible—which is exactly what fraudsters are counting on.

Building the human firewall

With the threat of social engineering becoming so ubiquitous, it’s more important than ever for banks to have systems and policies in place to help detect and deter this type of fraud.

Since humans are often described as the weakest link in the security chain, Lowers stresses that enterprise-wide education is critical for building a strong defense. “It’s not enough for a workforce to simply have policy guidelines—they really need to be educated on how to recognize this type of fraud,” he says. “They need to become a human firewall.” And like any IT firewall, the human firewall must be continually tested and updated with information as new trends emerge.

At Webster Bank, Syrop makes sure that everyone—not just the fraud department—stays up to date on current trends and understands how to spot red flags. The bank makes a point to train all business line managers on fraud prevention, with the expectation that they will in turn educate both their employees and their customers.

Both Lowers and Syrop agree that building a strong fraud culture starts with bank leadership. “It’s all about tone at the top,” Lowers says. “Awareness, education and culture are key.”

Tags: Anti-money launderingCyber crimeCybersecurityFraudSocial engineering
ShareTweetPin

Author

Monica C. Meinert

Monica C. Meinert

Monica C. Meinert is a senior editor at the ABA Banking Journal and VP for executive communications at the American Bankers Association.

Related Posts

Trump orders creation of AI ‘action plan’

ABA, associations ask administration to retain AI risk management framework

Compliance and Risk
February 13, 2026

ABA joined the Business Software Alliance and seven associations in urging Commerce Department officials to retain the core structure of a risk management framework for artificial intelligence as the Trump administration seeks to spur AI adoption in the...

FBI issues warning on AI used for financial fraud

Report: Deepfake detection efforts foiling fraudsters

Compliance and Risk
February 12, 2026

While artificial intelligence is widely used for fraud and scams, fraudsters are getting increasingly frustrated with detection systems used by banks and other organizations to to spot use of the technology, according to a new report on the...

Congressional resolution would overturn SEC cyber incident reporting rules

Congress reauthorizes private-public cybersecurity framework

Compliance and Risk
February 6, 2026

Lawmakers reauthorized a voluntary framework for the private sector and government agencies to share information about cyberthreats as part of a larger budget deal.

ABA Fraudcast: Taking the fraud prevention message directly to lawmakers

Podcast: How the SCAM Act would encourage platforms to go after scammers

ABA Banking Journal Podcast
February 4, 2026

Major tech platforms make billions of dollars from scammers who advertise on their sites, according to reporting from Reuters, and there’s not much incentive for them to change their practices — yet.

Creating a cyber-aware risk culture requires teamwork

Cybersecurity
February 2, 2026

Six key elements for a banking industry facing increasingly sophisticated threats from a wide variety of adversaries

Report: Data breaches becoming more focused

Report: Data breaches becoming more focused

Compliance and Risk
January 29, 2026

Financial services remained the top target for data breaches in 2025, and while the overall number of breaches continues to rise, attackers are more selective in who they set their sights on, according to the annual data breach...

NEWSBYTES

ABA supports HUD proposal to remove disparate impact from Fair Housing Act rule

February 13, 2026

Bill would prevent states from imposing lending rate caps on out-of-state banks

February 13, 2026

Nebraska lawmakers consider bills to require social media, telecoms to mitigate fraud

February 13, 2026

SPONSORED CONTENT

How Instant Payments Can Accelerate B2B Payments Modernization

How Instant Payments Can Accelerate B2B Payments Modernization

February 3, 2026
Digital Banking: The Gateway to Customer Growth and Competitive Differentiation

Digital Banking: The Gateway to Customer Growth and Competitive Differentiation

February 1, 2026
Planning Your 2026 Budget? Allocate Resources to Support Growth and Retention Goals

Why Every Digital Interaction Defines Your Brand Experience

February 1, 2026
Seeing More Check Fraud and Scams? These Educational Online Toolkits Can Help

Seeing More Check Fraud and Scams? These Educational Online Toolkits Can Help

November 1, 2025

PODCASTS

Podcast: How the SCAM Act would encourage platforms to go after scammers

February 4, 2026

A new kind of ‘community bank’ for small businesses

January 22, 2026

Podcast: A Lone Star banking perspective

January 15, 2026

American Bankers Association
1333 New Hampshire Ave NW
Washington, DC 20036
1-800-BANKERS (800-226-5377)
www.aba.com
About ABA
Privacy Policy
Contact ABA

ABA Banking Journal
About ABA Banking Journal
Media Kit
Advertising
Subscribe

© 2026 American Bankers Association. All rights reserved.

No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive

© 2026 American Bankers Association. All rights reserved.