Methods of Conducting Attacks

Understanding what potential attacks might look like helps better prepare an organization for real threats.

During tests, we simulate techniques used by real cybercriminals, both remotely and physically.

Indirect attacks (remote or technical) may include, among others:

  • creating fake websites,
  • sending emails or SMS messages containing phishing attempts,
  • phone contact (both landline and mobile),
  • delivering media with malicious software (e.g., USB drives, DVDs),
  • installing spying services or devices (e.g., fake Wi-Fi networks, modified ATMs, USB chargers).

Direct attacks (physical or personal) may include:

  • conversations with employees to obtain information,
  • attempts to gain physical access to buildings or restricted areas,
  • deliberate taking of unattended devices (e.g., laptops, phones),
  • observation, eavesdropping, or spying on workstations.

Thanks to a comprehensive approach that combines various methods, our social engineering tests accurately reflect real threats and help effectively strengthen the security of your organization.