Anatomy of an Attack

Social engineering is used in virtually every advanced email attack. The techniques used come in various forms, usually involving personalized messages with details harvested from social networking sites or other public sources.

Social Eng
Phase 1
Research Targets

Organized cybercrime rings are highly sophisticated, mining marketing databases, social media profiles, online archives and corporate websites to identity and profile targets.

Phase 2
Tailor Attack

Through well-researched, expertly-crafted email messages backed by matching phishing sites, these thieves impersonate a trusted individual or brand.

Phase 3
Deliver Emails

Some campaigns will score their first victims in under four minutes. Others will involve meticulous grooming over weeks or even months, as gain the trust of unsuspecting business or consumer targets.

Phase 4
Manipulate Emotions

Through carefully-timed messages designed to maximize tension and exploit personal insecurities, victims rush to respond without carefully assessing the legitimacy of the sender or the message.

Phase 5
Reap Rewards

Criminals receive and launder funds before vanishing into thin air. Or they infiltrate compromised accounts and extract valuable data and information that can be monetized in future crimes.

Why Do Social Engineering Attacks Work?

Field CTO, John Wilson

John discusses how social engineering attack tactics such as urgency and authority work to trick people into doing something they normally might not.

The Agari Advantage

Protection From Social Engineering Attacks

While traditional attacks leverage technology-based system vulnerabilities, social engineering attacks take advantage of human vulnerabilities by using deception to trick victims into performing harmful actions.

Agari carefully inspects each incoming email, analyzing the human relationships and behaviors. By understanding the identities behind the message, Agari spots the anomalies prevent attacks regardless of social engineering triggers.

Social Engineering Survey
Security Against Identity Deception

Identity deception is core to social engineering and the key to tricking people into downloading malware, logging into fake web pages, or giving up information.

Agari social engineering security detects threats and prevents identity deception tactics such as display name deception, spoofing, lookalike domains, and messages sent from hijacked sender accounts.

analyst research
Analyst Research
Osterman Research Report: Best Practices for Protecting Against Phishing, Ransomware, and ...
Learn more
Exaggerated Lion
Learn more
Automated Partner and Supplier Fraud Prevention

Cybercriminals often pose as a trusted supplier or partner in order to launch successful spear phishing, ransomware, business email compromise attacks, or other social engineering-based attack.

Agari automatically models your business partners, their relationships, and behaviors to auto-generate protection policies. This hands-free approach guarantees that your employees are protected against the modern social engineering-based attacks of today and those we expect in the future.

Simulated Product Demonstration

Try this simulated product demonstration to see why companies including Allergan, Comcast, and Informatica use Agari Phishing Defense™ to protect their inboxes.

Featured Products

Protect against costly advanced email attacks
Agari Phishing Defense™

Stop sophisticated identity deception threats including business email compromise, executive spoofing, and account takeover-based attacks.

Learn more
Agari Phishing Response™

Accelerate phishing incident triage, forensics, remediation, and breach containment for the Security Operations Center (SOC).

Learn more


Download the Email Fraud & Identity Deception Trends Report

The Agari Cyber Intelligence Division analyzed trillions ...

Learn More
White Paper
Cosmic Lynx Threat Dossier: The Rise of Russian BEC

Cosmic Lynx is a Russia-based BEC cybercriminal ...

Learn More
White Paper
Silent Starling Threat Dossier: BEC to VEC

Vendor email compromise is a new form ...

Learn More
H2 2020 Email Fraud & Identity Deception Trends Report: Page 2

Get ahead of the attacks costing organizations ...

Learn More
White Paper
Scattered Canary Threat Dossier

Business email compromise (BEC) has continued to ...

Learn More
social engineering tactics
Analyst Research
Email Security: Social Engineering Report

Socially engineered email attacks such as spear ...

Learn More
White Paper
Behind the 'From' Lines: Email Fraud on a Global Scale

Organized criminals are targeting businesses with identity ...

Learn More
Mail Letter

Would you like the confidence to trust your inbox?