Iran-linked cyber activity targets industrial systems, data leaks, and human vulnerabilities, with risk centred on access, exposure, and operational control


In the 2002 film Catch Me If You Can, Frank Abagnale Jr, played by Leonardo DiCaprio, confidently walks through airports posing as a Pan Am pilot, despite never having flown a plane. With the right uniform, the right language, and enough confidence, he bypasses security checks designed to stop unauthorised access.
This scene perfectly illustrates the meaning of social engineering.
In cybersecurity, social engineering means manipulating people into trusting you, complying with requests, or revealing information that grants access to systems, data, or physical environments. Social engineering attacks exploit human behaviour, assumptions, and social norms.
Social engineering is one of the most effective attack techniques because humans are often the weakest link in security. Organisations can deploy strong technical controls, but if employees are conditioned to trust authority, respond to urgency, or avoid conflict, attackers can bypass defences without triggering alarms.
Common social engineering techniques exploit predictable psychological pressures such as obligation, fear of missing out, trust in authority figures, commitment to previous actions, kindness, and the tendency to follow perceived group behaviour. When these triggers are applied convincingly, even security-aware individuals can be manipulated into breaking policy.
Understanding the true meaning of social engineering is critical, because modern security failures are increasingly caused by exploited people.
As tech evolves, so do attacker tools. Phishing, deepfakes, AI-driven impersonation — they all tug at human psychology. The brain is wired for speed, not scrutiny, and that’s what attackers exploit.
Humans use two decision systems:
Attackers push you to react using System 1 so you miss the red flags. They misuse cues like authority, urgency, or familiarity to short-circuit your judgment.
Even strong technical controls can collapse when your user clicks the wrong link or downloads a malicious file that looks “trusted.” To defend against that, organisations need to treat human psychology as part of their security surface. Social engineering can be classified into several attack vectors, each exploiting a specific human weakness or bias.
Phishing attacks impersonate reputable organisations or individuals. With the rise of generative AI, these messages can be highly convincing. Typical phishing campaigns target large numbers of businesses, flooding inboxes with generic requests. Many contain links to malicious landing pages where victims are prompted to enter sensitive details such as usernames, passwords, or bank information which enables credential theft, account compromise, and potential financial fraud.
Spear-phishing targets specific individuals, often those with access to privileged information. When high-level executives are targeted, the attack is called whaling and can result in high-value data breaches or significant financial losses.
Vishing uses similar tactics but delivered via phone calls or voice messages, while smishing applies them through SMS text messages sent to the victim’s mobile device.
Smarttech247’s NoPhish solution enables employees to report suspicious emails with a single click in Office 365. Once reported, the system automatically scans the email using threat intelligence APIs, flags malicious URLs or attachments, and sends the findings to expert analysts for review. This ensures faster detection, quicker response, and reduced risk of a successful attack. With 24/7 monitoring, rapid incident management, and human-led analysis, organisations can turn their workforce into the first line of defence.
An attacker creates a false scenario to persuade a victim to disclose valuable information. Often, the attacker claims the victim has suffered a security breach and offers a “solution,” such as installing a software patch that actually contains malware.
The attacker poses as another person to gain system access, using props, credentials, technical jargon, or uniforms to make the deception credible.
The attacker promises a reward in exchange for sensitive information. In most cases, the reward is never delivered.
Similar to baiting but involving an actual exchange of goods or services for information. The victim willingly provides details in return for the promised benefit.
The attacker compromises a trusted website or online forum often visited by the target, possibly injecting malware to infect visiting users and gain access to their compromised machines. The term comes from the idea of targeting places where people naturally gather, like a physical waterhole.
A physical intrusion where the attacker bypasses security by following closely behind an authorised user into a secure area.
The attacker gains credibility by assisting the victim with a problem, sometimes one the attacker secretly caused, before requesting sensitive information in return.
In early 2025, Scattered Spider (tracked as UNC3944) continued to operate as one of the most sophisticated cyber threat groups targeting global enterprises. According to a joint CISA and FBI advisory, the group has engaged primarily in ransomware operations, leveraging social engineering, identity abuse, and cloud exploitation to gain access to target networks.
CISA and FBI reporting highlights UNC3944’s frequent use of impersonation, particularly posing as IT helpdesk staff via vishing or smishing to obtain credentials and convincing employees to share one-time passwords for MFA bypass.
Smarttech247’s own research expands on these findings, showing that their initial access methods also include phishing campaigns through fake support portals, insider recruitment for access credentials, and exploitation of exposed VPNs, Citrix environments, and misconfigured cloud services.
Once inside the network, the group conducting credential harvesting and scanning internally for high-value targets. Post-compromise, UNC3944 exfiltrate sensitive data, maintaining persistence through scheduled tasks and cloud services, deploying ransomware or selling access to other threat actors, and in some cases disrupting operations.
By combining living off the land techniques with targeted social engineering, UNC3944 can evade detection for extended periods, maximising the operational and financial impact on large enterprises.
UNC3944’s methods show that even well-defended organisations can be compromised through human and procedural weaknesses, not just technical flaws. Their focus on helpdesks, outsourced IT, and cloud misconfigurations highlights the need for layered defences, combining security awareness training, strict access controls, and proactive monitoring to detect unusual account activity before it escalates.
As reported by Help Net Security, a textbook spear-phishing campaign targeted companies in finance, manufacturing, defence, and logistics with convincing job-application emails. An example of social engineering, the messages appeared to come from legitimate candidates and included what seemed to be a harmless CV file.
In reality, the file contained malicious code designed to exploit a vulnerability in the popular file-compression tool WinRAR (CVE-2025-8088). When opened, it unpacked hidden malicious files capable of installing backdoors and configuring themselves to run automatically whenever the system restarted.
While the flaw itself was a technical vulnerability, the attackers’ entry point relied entirely on social engineering. They exploited the recipient’s trust in the hiring process to deliver the payload. No advanced intrusion techniques were required.
In this incident, none of the targeted organisations were ultimately compromised, but the attempt underscores the risk of blended threats, where human manipulation enables technical exploitation. It is precisely the type of scenario that social engineering penetration testing aims to detect and mitigate before an actual breach occurs.
Social engineering penetration testing identifies human vulnerabilities before a real attacker can exploit them. Even the most advanced firewalls, intrusion detection systems, and endpoint protections can be bypassed if an attacker convinces an employee to hand over credentials, open a malicious attachment, or grant physical access.
Effective social engineering pen tests simulate the tactics of real-world threat actors with the aim of manipulating, deceiving, and persuading employees into breaking security protocols. This can include phishing emails, vishing calls, smishing messages, or any other exploit covered earlier. The goal is to measure both staff awareness and the effectiveness of your policies, training, and incident response.
By mimicking an attacker’s methods without disrupting operations or compromising sensitive data, pen tests reveal how far an intruder could get using only persuasion and deception. They often uncover weaknesses missed by purely technical penetration testing. A typical engagement begins with reconnaissance to identify potential targets, followed by controlled attack scenarios to gauge susceptibility.
At the conclusion, a detailed report outlines which attempts succeeded, why they worked, and actionable steps to strengthen defences.
Social engineering penetration testing exposes the social and procedural gaps attackers exploit every day. Combined with technical penetration testing, it provides a complete, real-world view of your organisation’s attack surface.
When granting system access, users should receive only the minimum permissions necessary to complete their tasks. Organisation should separate access levels so no single individual can perform an entire chain of actions that could compromise the system. This limits the impact of insider threats and reduces the damage a successful social engineering attack could cause.
Security awareness training is one of the most effective defences against social engineering. Without regular assessment and realistic phishing simulations, staff may not recognise the subtle cues of a malicious email, a suspicious phone call, or conversations engineered to extract information. By training employees and assessing them through simulations, organisations can create a prepared workforce capable of identifying and stopping attacks before they cause damage.
We protect your on-premise/cloud/OT environments - 24x7x365