{"id":15063,"date":"2024-08-02T13:38:33","date_gmt":"2024-08-02T13:38:33","guid":{"rendered":"https:\/\/trustpair.com\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/"},"modified":"2025-07-22T09:40:30","modified_gmt":"2025-07-22T09:40:30","slug":"what-is-social-engineering-fraud-and-how-does-it-work","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/","title":{"rendered":"What is social engineering fraud and how does it work?"},"content":{"rendered":"<p><strong>Social engineering fraud<\/strong> allows a criminal to access information or finances by relying on human manipulation. It happened in 2016 when the emails from the democratic party were leaked, potentially changing the course of the elections. The best defense against social engineering is knowing what to watch out for. This piece explores <strong>the types of fraud that use social engineering<\/strong>, and how to spot the scams.<\/p>\n<p>Trustpair blocks the financial effects of social engineering attacks by continuously controlling payments before they\u2019re executed. Suspicious payments to<a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\"> unknown third parties<\/a> will be blocked. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Request a demo to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How does social engineering work?<\/h2>\n<p>Social engineering works by <strong>manipulating victims into making decisions and taking actions<\/strong>. Cyber-criminals exploit private information they find online to address their victims and attempt to gain unauthorized access to computers, systems, bank accounts, etc.<\/p>\n<p>In some cases, social engineering relies on the <strong>curious nature of people<\/strong>, encouraging them to satisfy a craving and find the missing pieces to a puzzle. Alternatively, fraudsters can use the idea of FOMO (fear of missing out) to encourage a victim to get involved before they lose their chance. Many feel compelled to take advantage of a limited-time offer for a new product or service.<\/p>\n<p>Another way that fraudsters use social engineering is to <strong>impersonate figures of authority<\/strong>, as these are often trusted without question. The likes of lawyers, bankers, and government officials are the types of figures with this status that may be impersonation targets.<\/p>\n<p>Finally, criminals could leverage social engineering to pretend to help their target. For example, by informing their victim that their device has been compromised by malware, but to click a link in order to fix the issues. Of course, this link would be laced with ransomware to actually infiltrate the device.<\/p>\n<p>In all types of social engineering fraud, the perpetrators rely on human psychology to guide the victim into opening up access to their information. Plus, they often learn as much as possible about their victims, using social media and other online resources, before launching their attacks.<\/p>\n<h2>What are the types of fraud using social engineering?<\/h2>\n<p>Here are four key types of fraud relying on social engineering that businesses should be aware of:<\/p>\n<ul>\n<li>Phishing (<a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">check how to spot a phishing email here<\/a>)<\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/ceo-fraud-how-to-protect-your-organization-from-fraudsters\/\">CEO fraud<\/a><\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/vendor-fraud-prevention\/\">Vendor fraud<\/a><\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/8-effective-strategies-for-employee-fraud-prevention\/\">Employee fraud<\/a> (aka internal fraud)<\/li>\n<\/ul>\n<h3>Phishing<\/h3>\n<p>Phishing is the act of impersonation over email. The fraudsters often <strong>spoof the real email address of a known contact of the business<\/strong>, like a third party or supplier. Then, they ask for payment or information. Because the victim already knows and trusts the person that they think is on the other end of the email, they are more likely to comply with any request.<\/p>\n<p>Sometimes, phishing emails also involve the<strong> inclusion of a malicious link<\/strong>. If clicked on, this might download malware onto the victim\u2019s device, or infect their system with ransomware. The criminals use social engineering techniques to ensure the link is clicked and typically use the idea that the victim has something to gain.<\/p>\n<p>Phishing is incredibly damaging because it is so prevalent in today\u2019s world, with an estimated 3.4 million spam emails sent every single day. Moreover, the average phishing attack cost businesses $4.65 million per attack in 2021.<\/p>\n<p>Over $64,000 was lost to a huge phishing scam in 2007, one of the first of its kind. Fraudsters impersonated a Swedish bank, Nordea, in a mass email campaign in order to snare as many customers as possible.<\/p>\n<p>While those who didn\u2019t bank with Nordea simply ignored the spam email, the real customers had no reason to doubt its legitimacy. It meant that when customers clicked on the link, they were redirected to a fake version of the bank\u2019s online login portal and input their credentials, which the criminals captured. Then, the fraudsters had all the information they needed to <strong>access the bank accounts of real customers and steal their money.<\/strong><\/p>\n<h3>CEO fraud<\/h3>\n<p>CEO fraud is one type of ruse that criminals use in phishing scams. Here, <strong>the social engineering element is that the fraudsters impersonate the CEO or another senior executive<\/strong> at a company.<\/p>\n<p>Moreover, these specific individuals are targeted because there are often lots of media and online resources for the attackers to do their research on. For this reason, it\u2019s sometimes known as <a href=\"https:\/\/trustpair.com\/gb\/blog\/4-examples-of-spear-phishing-attacks\/\">spear phishing<\/a> or <a href=\"https:\/\/trustpair.com\/gb\/blog\/whaling-phishing-attacks-what-are-they-and-how-to-protect-yourself\/\">whaling.<\/a><\/p>\n<p>Usually, the employee who is targeted has some sort of <strong>responsibility at the company<\/strong>, such as having the authority to approve payment transfer requests.<\/p>\n<p>CEO fraud typically sees the perpetrators use urgency tactics &#8211; compelling the victim to act instantly. This ensures the victim has no time to question the legitimacy of the request and won\u2019t realize anything is suspicious until afterward.<\/p>\n<p>CEO fraud was attributed to over a third of all business email compromise scams in 2021, and companies in the US received 27% of the attacks. It\u2019s therefore a popular way for scammers to gain access to information or company funds, exploiting the vulnerability of company hierarchy.<\/p>\n<p>An unfortunate case of CEO fraud caught an undisclosed multinational company recently in 2019. The CEO of the British branch received a phone call and recognized the voice of the other party, an apparent Director from the German branch of the company. But this was actually AI, using <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-spot-a-deepfake\/\">deep fake technology<\/a> to mimic the sounds of the Director exactly and make a request to pay a fake supplier. He fell victim, transferring over $243,000 to fraudsters.<\/p>\n<h3>Vendor fraud<\/h3>\n<p>Vendor fraud is similar to CEO fraud, but here, <strong>the criminals impersonate merchants and suppliers.<\/strong> Almost always, the criminals ensure that the vendors they impersonate are actually associated with the firm. This increases the perceived legitimacy of online threats.<\/p>\n<p>Vendor fraud usually works through email channels, and the fraudsters either hack into the real vendor or <a href=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-vs-phishing-what-are-the-differences\/\">spoof their email address<\/a> with something similar. Then, they\u2019ll request a change of bank details to get a fake invoice paid into the criminal account instead of the real supplier. By the time the incident response is underway, the criminals have already cleared out the account.<\/p>\n<p>Vendor fraud makes businesses particularly vulnerable since almost <strong>every business works with a supply chain<\/strong>, or at least one third party. On average, US businesses are losing $300,000 when falling victim to this type of scam.<\/p>\n<p>Save the Children fell victim to this social engineering scam in 2018 when fraudsters sent out invoices for work that was never done. They claimed to be real suppliers in Pakistan that were building resources in the country &#8211; and had clearly done their research as Save the Children was experiencing significant activity in the country. The invoice request from this fake vendor led to losses of around $1 million.<\/p>\n<h3>Employee fraud<\/h3>\n<p>Social engineering techniques are also applied in the case of employee fraud, which is also known as <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-reduce-and-detect-internal-fraud-risk\/\">internal fraud<\/a>. Here, <strong>data and systems are compromised internally<\/strong>, as an employee or ex-employee manipulates their colleagues. It\u2019s also much easier to beat the encryption or firewall as insiders typically know the defense mechanisms.<\/p>\n<p>The fraudster might <strong>divert funds, misappropriate expenses, or submit extra invoices<\/strong> for fake suppliers to siphon cash from the company. Worryingly, 75% of employees have admitted to stealing from their workplace at least once.<\/p>\n<p>Corporate bribery is one of the ways that social engineering plays a part in internal fraud. Here, an employee might not disclose a pre-existing relationship with one of the suppliers bidding for a contract, and favor them in the review process. Or, a third party might provide secret kickbacks for an employee to win a contract with a huge firm.<\/p>\n<p>Between December 2017 and February 2019, an ex-government worker was found to have been committing employee fraud from New Jersey\u2019s Department of Community Programs. The perpetrator filed invoices by using fake companies and fake names and made away with over $74,000 across the 14-month period.<\/p>\n<p>Learn how to fight B2B fraud effectively in <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/?utm_campaign=7174403-2025%20UK%20Fraud%20Study&#038;utm_source=website&#038;utm_medium=header\">our latest fraud report!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How to spot and stop social engineering scams?<\/h2>\n<p>Fraud attempts must meet the conditions of the <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-fraud-triangle-understanding-fraud-risk\/\">fraud triangle<\/a> in order to be successful. This is underpinned by three factors:<\/p>\n<ul>\n<li>Opportunity<\/li>\n<li>Pressure<\/li>\n<li>Rationalization<\/li>\n<\/ul>\n<p>By preventing just one of these factors, organizations can <strong>better protect themselves against fraud.<\/strong><\/p>\n<p>For example, <a href=\"https:\/\/trustpair.com\/gb\/blog\/fraud-detection-models-and-machine-learning-all-you-need-to-know\/\">implementing fraud detection methods<\/a> removes the opportunity in most cases. To do this, institutions can introduce <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-does-internal-control-prevent-corporate-fraud\/\"><strong>new internal control measures<\/strong><\/a>, such as upgrading their spam filters and teaching employees how to react to emails from untrustworthy sources.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/gb\/blog\/why-is-the-segregation-of-duties-so-important-in-managing-fraud-risk\/\">Segregation of duties<\/a> is another <strong>strong internal control measure<\/strong> that can prevent the success of this type of attack. It refers to the splitting up of responsibilities in finance to ensure that payments can\u2019t be approved by a single individual. By following the <a href=\"https:\/\/trustpair.com\/gb\/blog\/is-the-4-eyes-principle-the-most-effective-way-to-block-fraud\/\">four eyes principle<\/a>, as it is otherwise known, firms can guarantee due diligence before any payments are made or data is shared with the wrong sources.<\/p>\n<p>Alternatively, fraud prevention techniques might include awareness training &#8211; where employees undergo the conditions of social engineering to test their responses. From here, companies can set new internal policies to guide their team members or introduce regular tests to keep the idea of social engineering in the minds of their employees. Two-factor authentication can also prevent access for fraudsters that get hold of a password, preventing a security breach.<\/p>\n<p>Platforms like Trustpair work to <strong>prevent all financial effects of the intrusion of social engineering fraud.<\/strong> We continuously monitor third-party details and block any payments where third parties are found to be suspicious before the money leaves your account.<\/p>\n<h3>Summary<\/h3>\n<p>Social engineering fraud relies on the<strong> manipulation of the victim to take a certain action,<\/strong> like clicking on a link or transferring money. CEO fraud, vendor fraud, phishing scams, and internal fraud all use malicious social engineering. While you can\u2019t prevent it, you can detect the scams and protect your business by being aware of the signs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social engineering fraud allows a criminal to access information or finances by relying on human manipulation. It happened in 2016 when the emails from the democratic party were leaked, potentially changing the course of the elections. The best defense against social engineering is knowing what to watch out for. This piece explores the types of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15064,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-15063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fraud through social engineering: how it works and how to block it - Trustpair<\/title>\n<meta name=\"description\" content=\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fraud through social engineering: how it works and how to block it - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T09:40:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"What is social engineering fraud and how does it work?\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-22T09:40:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\"},\"wordCount\":1645,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\",\"name\":\"Fraud through social engineering: how it works and how to block it - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-22T09:40:30+00:00\",\"description\":\"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is social engineering fraud and how does it work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fraud through social engineering: how it works and how to block it - Trustpair","description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/","og_locale":"en_GB","og_type":"article","og_title":"Fraud through social engineering: how it works and how to block it - Trustpair","og_description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.","og_url":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:33+00:00","article_modified_time":"2025-07-22T09:40:30+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"What is social engineering fraud and how does it work?","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-22T09:40:30+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/"},"wordCount":1645,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/","url":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/","name":"Fraud through social engineering: how it works and how to block it - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-22T09:40:30+00:00","description":"Social engineering techniques include phishing, whaling, baiting\u2026 Learn how to spot and prevent social engineering fraud.","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_1519230929.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"What is social engineering fraud and how does it work?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=15063"}],"version-history":[{"count":11,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15063\/revisions"}],"predecessor-version":[{"id":20442,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15063\/revisions\/20442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/15064"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=15063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=15063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=15063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}