ABA Banking Journal
No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
SUBSCRIBE
ABA Banking Journal
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive
No Result
View All Result
No Result
View All Result
Home Cybersecurity

Social Engineering: The Art of Human Hacking

April 29, 2016
Reading Time: 3 mins read

Online Security Concept - Fingerprint on Virtual Screen

By Monica C. Meinert

Each year, millions of dollars are lost to a type of fraud that’s particularly difficult to detect and stop, and it’s all based on a criminal’s ability to exploit a basic human characteristic: the tendency to trust.

It’s a practice called “social engineering,” in which a fraudster successfully manipulates a victim into taking specific actions like sending wire transfers or giving over confidential information while posing as a trustworthy source.

“Social engineering is fraud by deception,” says Mark Lowers, CEO of Lowers Risk Group, a firm based in Purcellville, Va. “It’s about playing on the average individual’s sense of decency.”

Social engineers use a variety of tactics to gain information that can help them win over the trust of their victims. Strategies can include sophisticated approaches like phishing or the tried-and-true methods of dumpster diving, pretext calling or impersonating a company employee or business associate. Once a social engineer has the information they need to appear legitimate, they can make contact with their victim and set the scheme into motion.

Virtually anyone can fall victim to a social engineering scam, but businesses in particular have seen an increase in this type of fraud over the past several years.

“[My] firm has handled dozens of cases this past year where very well-run organizations transferred big, six-figure numbers as a result of [social engineering scams],” Lowers says. “And they didn’t get it back—by the time they realized, the funds had been transferred on to multiple other banks.”

Email provides a particularly lucrative opportunity for social engineers—according to a 2014 study by McAfee, 97 percent of people globally were unable to correctly identify phishing emails. And the FBI reports that in the U.S. alone, there have been more than 7,000 victims and $747 million in losses as a result of business email compromise—a specific type of social engineering fraud—since 2013.

In business email scams, “fraudsters typically target businesses working with foreign suppliers or business that perform wire transfers or ACH transactions as payments,” often sending phony invoices or requests for payment, explains Kim Syrop, SVP and director of fraud and loss management for Webster Bank, a $22 billion institution based in Waterbury, Conn. To the person on the receiving end, these requests seem to come from a trusted vendor, which is how so many unsuspecting employees have been duped into facilitating fraudulent transactions.

In other cases, crooks will impersonate corporate CEOs, creating fake email addresses or hacking existing email accounts. From there, Syrop says, they typically reach out to a lower-level employee with wire origination authority and request a transfer of funds, often stressing confidentially. The employee naturally wants to comply with their boss’ wishes as quickly and efficiently as possible—which is exactly what fraudsters are counting on.

Building the human firewall

With the threat of social engineering becoming so ubiquitous, it’s more important than ever for banks to have systems and policies in place to help detect and deter this type of fraud.

Since humans are often described as the weakest link in the security chain, Lowers stresses that enterprise-wide education is critical for building a strong defense. “It’s not enough for a workforce to simply have policy guidelines—they really need to be educated on how to recognize this type of fraud,” he says. “They need to become a human firewall.” And like any IT firewall, the human firewall must be continually tested and updated with information as new trends emerge.

At Webster Bank, Syrop makes sure that everyone—not just the fraud department—stays up to date on current trends and understands how to spot red flags. The bank makes a point to train all business line managers on fraud prevention, with the expectation that they will in turn educate both their employees and their customers.

Both Lowers and Syrop agree that building a strong fraud culture starts with bank leadership. “It’s all about tone at the top,” Lowers says. “Awareness, education and culture are key.”

Tags: Anti-money launderingCyber crimeCybersecurityFraudSocial engineering
ShareTweetPin

Author

Monica C. Meinert

Monica C. Meinert

Monica C. Meinert is a senior editor at the ABA Banking Journal and VP for executive communications at the American Bankers Association.

Related Posts

Banking sector, regulators announce joint effort to address AI risks

ABA, associations offer recommendations for revising SEC cybersecurity disclosures

Compliance and Risk
April 10, 2026

ABA joined four associations in providing recommendations for how the SEC could reform its regulations for cybersecurity disclosures by businesses.

ABA points to role of regulators in discouraging bank engagement in digital assets

Treasury to share cybersecurity information with digital asset firms

Compliance and Risk
April 9, 2026

The Treasury Department will offer digital asset firms the same cybersecurity information it shares with banks and other financial institutions, provided the firms meet certain criteria, according to an announcement.

CISA, federal agencies issue advisory on Iran-related cyberattacks

CISA, federal agencies issue advisory on Iran-related cyberattacks

Compliance and Risk
April 8, 2026

The Cybersecurity and Infrastructure Security Agency has issued a joint advisory with other federal agencies warning critical infrastructure to be on heightened alert for cyberattacks related to the Iranian conflict.

Survey: Third of bank customers hit by fraud in past year

FBI: Cybercrime losses increased 26% in 2025

Compliance and Risk
April 7, 2026

Americans lost nearly $20.9 billion to cybercrime last year, representing a 26% surge from the year before, as scammers increasingly turned to cryptocurrency and artificial intelligence to facilitate their crimes, according to a new report by the FBI.

From controls to care: a human‑centered fraud policy framework

From controls to care: a human‑centered fraud policy framework

Compliance and Risk
April 7, 2026

Most fraud programs are designed around systems. But scams succeed because they are fundamentally psychological.

New York State issues guidance on AI-related cybersecurity risks to financial institutions

Cybersecurity, fraud top list of risk concerns among bank boards, executives

Compliance and Risk
April 6, 2026

Cybersecurity and fraud are the top two risks that worry bank board members and executives in 2026, with concern about regulatory risk receding, according to a new survey on bank risks by Bank Director.

NEWSBYTES

Banking agencies issue revised risk management model guidance

April 17, 2026

ABA supports deregulatory approach in proposed CFPB strategic plan

April 17, 2026

ABA DataBank: Workplace use of generative AI

April 17, 2026

SPONSORED CONTENT

Planning Your 2026 Budget? Allocate Resources to Support Growth and Retention Goals

How leading banks are enhancing customer engagement through financial data insights

April 10, 2026
Check Fraud Is Outpacing Legacy Controls. What Banks Should Evaluate Now.

Check Fraud Is Outpacing Legacy Controls. What Banks Should Evaluate Now.

April 1, 2026
How top agricultural lenders are approaching AI, automation and innovation in 2026

How top agricultural lenders are approaching AI, automation and innovation in 2026

March 2, 2026
Top 7 FP&A Trends in Banking for 2026

Top 7 FP&A Trends in Banking for 2026

March 1, 2026

PODCASTS

Podcast: Capitalizing on opportunities to serve high-net-worth clients

April 9, 2026

Podcast: Are credit union commercial loans risky business?

March 30, 2026

Podcast: Risk and strategy in sponsor banking

March 19, 2026

American Bankers Association
1333 New Hampshire Ave NW
Washington, DC 20036
1-800-BANKERS (800-226-5377)
www.aba.com
About ABA
Privacy Policy
Contact ABA

ABA Banking Journal
About ABA Banking Journal
Media Kit
Advertising
Subscribe

© 2026 American Bankers Association. All rights reserved.

No Result
View All Result
  • Topics
    • Ag Banking
    • Commercial Lending
    • Community Banking
    • Compliance and Risk
    • Cybersecurity
    • Economy
    • Human Resources
    • Insurance
    • Legal
    • Mortgage
    • Mutual Funds
    • Payments
    • Policy
    • Retail and Marketing
    • Tax and Accounting
    • Technology
    • Wealth Management
  • Newsbytes
  • Podcasts
  • Magazine
    • Subscribe
    • Advertise
    • Magazine Archive
    • Newsletter Archive
    • Podcast Archive
    • Sponsored Content Archive

© 2026 American Bankers Association. All rights reserved.