ABA Banking Journal
No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
SUBSCRIBE
ABA Banking Journal
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
No Result
View All Result
No Result
View All Result
Home Cybersecurity

Social Engineering: The Art of Human Hacking

April 29, 2016
Reading Time: 3 mins read

Online Security Concept - Fingerprint on Virtual Screen

By Monica C. Meinert

Each year, millions of dollars are lost to a type of fraud that’s particularly difficult to detect and stop, and it’s all based on a criminal’s ability to exploit a basic human characteristic: the tendency to trust.

It’s a practice called “social engineering,” in which a fraudster successfully manipulates a victim into taking specific actions like sending wire transfers or giving over confidential information while posing as a trustworthy source.

“Social engineering is fraud by deception,” says Mark Lowers, CEO of Lowers Risk Group, a firm based in Purcellville, Va. “It’s about playing on the average individual’s sense of decency.”

Social engineers use a variety of tactics to gain information that can help them win over the trust of their victims. Strategies can include sophisticated approaches like phishing or the tried-and-true methods of dumpster diving, pretext calling or impersonating a company employee or business associate. Once a social engineer has the information they need to appear legitimate, they can make contact with their victim and set the scheme into motion.

Virtually anyone can fall victim to a social engineering scam, but businesses in particular have seen an increase in this type of fraud over the past several years.

“[My] firm has handled dozens of cases this past year where very well-run organizations transferred big, six-figure numbers as a result of [social engineering scams],” Lowers says. “And they didn’t get it back—by the time they realized, the funds had been transferred on to multiple other banks.”

Email provides a particularly lucrative opportunity for social engineers—according to a 2014 study by McAfee, 97 percent of people globally were unable to correctly identify phishing emails. And the FBI reports that in the U.S. alone, there have been more than 7,000 victims and $747 million in losses as a result of business email compromise—a specific type of social engineering fraud—since 2013.

In business email scams, “fraudsters typically target businesses working with foreign suppliers or business that perform wire transfers or ACH transactions as payments,” often sending phony invoices or requests for payment, explains Kim Syrop, SVP and director of fraud and loss management for Webster Bank, a $22 billion institution based in Waterbury, Conn. To the person on the receiving end, these requests seem to come from a trusted vendor, which is how so many unsuspecting employees have been duped into facilitating fraudulent transactions.

In other cases, crooks will impersonate corporate CEOs, creating fake email addresses or hacking existing email accounts. From there, Syrop says, they typically reach out to a lower-level employee with wire origination authority and request a transfer of funds, often stressing confidentially. The employee naturally wants to comply with their boss’ wishes as quickly and efficiently as possible—which is exactly what fraudsters are counting on.

Building the human firewall

With the threat of social engineering becoming so ubiquitous, it’s more important than ever for banks to have systems and policies in place to help detect and deter this type of fraud.

Since humans are often described as the weakest link in the security chain, Lowers stresses that enterprise-wide education is critical for building a strong defense. “It’s not enough for a workforce to simply have policy guidelines—they really need to be educated on how to recognize this type of fraud,” he says. “They need to become a human firewall.” And like any IT firewall, the human firewall must be continually tested and updated with information as new trends emerge.

At Webster Bank, Syrop makes sure that everyone—not just the fraud department—stays up to date on current trends and understands how to spot red flags. The bank makes a point to train all business line managers on fraud prevention, with the expectation that they will in turn educate both their employees and their customers.

Both Lowers and Syrop agree that building a strong fraud culture starts with bank leadership. “It’s all about tone at the top,” Lowers says. “Awareness, education and culture are key.”

Tags: Anti-money launderingCyber crimeCybersecurityFraudSocial engineering
ShareTweetPin

Author

Monica C. Meinert

Monica C. Meinert

Monica C. Meinert is a senior editor at the ABA Banking Journal and VP for executive communications at the American Bankers Association.

Related Posts

Survey: Net interest margins, cybersecurity top risks facing community banks

Survey: Net interest margins, cybersecurity top risks facing community banks

Community Banking
October 7, 2025

Net interest margins are the most important external risk facing community banks, according to the Conference of State Bank Supervisors’ 2025 community bank survey. Cybersecurity was the top internal risk.

FinCEN proposes applying BSA requirements to investment advisers

FS-ISAC urges financial sector to adopt timeline for implementing quantum computing defenses

Compliance and Risk
September 25, 2025

The Financial Services Information Sharing and Analysis Center called for the creation of a timeline for the financial sector to bolster its cybersecurity defenses against threats posed by quantum computing.

Survey: Banks boosting cybersecurity due to AI while also investing in technology

G7 group issues document on AI benefits, risks to financial system

Compliance and Risk
September 25, 2025

A G7 working group has released a statement outlining what policymakers and financial institutions should consider when weighing the potential cybersecurity benefits of artificial intelligence against misuse of the technology by malicious actors.

New task force to tackle financial fraud, scams

FBI alert: Scammers impersonating agency’s cyber-crimes website

Compliance and Risk
September 23, 2025

The FBI is warning that scammers are spoofing the website of the agency’s Internet Crime Complaint Center, or IC3, to trick consumers into turning over financial information.

BAFT releases report on best practices, guidance for ISO 20022 migration

ABA op-ed: Don’t fall for fintech, retailer spin on consumer financial information sharing

Compliance and Risk
September 12, 2025

Financial technology firms and mega-retailers are trying to trick the public about access to their own consumer financial information so the companies can profit from charging for access to that same data, ABA’s Ryan Miller wrote in a...

House lawmakers propose federal studies on AI in financial services, housing

House committee advances ABA-backed cybersecurity bill

Compliance and Risk
September 4, 2025

The House Homeland Security Committee advanced legislation to extend an existing law that enables the federal government to share real-time information about cyberthreats with the private sector.

NEWSBYTES

Mortgage rates drop

October 9, 2025

Bankers stress need for community bank leverage ratio reform

October 9, 2025

Bessent outlines policy agenda to boost community bank business model

October 9, 2025

SPONSORED CONTENT

Rethinking Outsourcing: The Value of Tech-Enabled, Strategic Growth Partnerships

Rethinking Outsourcing: The Value of Tech-Enabled, Strategic Growth Partnerships

October 1, 2025
What good looks like in Small Business Lending – and how to get there

What good looks like in Small Business Lending – and how to get there

October 1, 2025
The Connectivity Dividend

The Connectivity Dividend

September 1, 2025
Building Trust with Every Transaction

Building Trust with Every Transaction

September 1, 2025

PODCASTS

Podcast: Bigger data boosts financial inclusion at Synchrony

October 9, 2025

Podcast: AI and the future of BSA risk management

October 2, 2025

Podcast: The real difference between stablecoins and tokenized deposits

September 24, 2025

American Bankers Association
1333 New Hampshire Ave NW
Washington, DC 20036
1-800-BANKERS (800-226-5377)
www.aba.com
About ABA
Privacy Policy
Contact ABA

ABA Banking Journal
About ABA Banking Journal
Media Kit
Advertising
Subscribe

© 2025 American Bankers Association. All rights reserved.

No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive

© 2025 American Bankers Association. All rights reserved.