top of page

Social engineering and open-source intelligence (OSINT): What you need to know to protect yourself



Sharing personal information online has become a regular part of our daily routines. Whether it's a post on social media, a casual comment in a podcast, or even a professional update on LinkedIn, it’s easy to let bits of our lives slip into the public domain.  

 

However, what many don’t realise is that this very information can be used against us. Hackers and malicious actors are getting smarter and finding ways to exploit publicly available data to manipulate individuals and organisations. One method they use is Open-Source Intelligence (OSINT). 

 

What is open-source intelligence? 

Open-Source Intelligence (OSINT) refers to the practice of gathering information from publicly available sources. This could be anything from social media profiles and public records to news stories, job postings, and even what you share in online forums. Hackers use OSINT techniques to gather as much data as they can about an individual or organisation, often with the goal of crafting a more personalised attack. 

 

For example, hackers can collect details from a person’s social media pages, such as their job title, location, interests, and even family members, and use that information to launch a targeted attack. If they know where you work, what software you use, or who you communicate with, they can customise their attack to be more convincing, increasing the chances of success.  

 

What are the risks of oversharing online? 

It’s tempting to share personal updates online, but doing so without considering the potential risks can leave you vulnerable to exploitation. The information you share, even if it seems trivial, can provide hackers with valuable clues that allow them to craft their attacks. 

 

Social media posts 

Social media is a goldmine for OSINT gathering. What you post on platforms like Facebook, Instagram, or Twitter could provide hackers with detailed insights into your life. For example, if you post about a work achievement or a system you fixed, an attacker might be able to use that to figure out what software you’re using or what systems your company depends on. In some cases, it’s not just the post itself but also the people you interact with and the comments you make that provide extra clues. 

 

Job profiles and work history 

LinkedIn, often seen as a professional networking site, can also reveal a lot about you. While it’s great for career development, it can also be a goldmine for hackers. A quick look at your LinkedIn profile gives them access to your job title, work history, company name, and even connections. If they know you work at a specific company or have a certain role, they might use this information to pose as a colleague and send you a phishing email. They could also find details about your colleagues and craft a more convincing impersonation. 

 

Podcasts, videos, and even backgrounds 

Podcasts and videos are another avenue for hackers to gather information. Many people are unaware of how much they reveal in the background of a video or podcast. For example, the logo of a company or the programmes you’re using could be visible, giving hackers additional insight into your work environment.  

 

Even casual comments in a podcast or video can help them understand your professional routine or personal interests. It’s easy to underestimate how much information can be gleaned from something as simple as a background item or a passing mention. 

 

Real world examples of social engineering 

There are plenty of examples where OSINT played a big role in high-profile social engineering attacks. 


One such incident occurred in 2011 with the Sony Pictures hack. Hackers used publicly available information about the company, its employees, and their roles to create targeted phishing attacks. By exploiting personal details shared online, the attackers were able to access sensitive company data, including personal emails and unreleased films. 

 

In another case, hackers targeted employees at a well-known tech company. They researched their victims on social media and discovered details like interests, hobbies, and professional connections. Using this information, they impersonated trusted colleagues and sent convincing emails that led to the compromise of the company’s systems. 

 

How to protect yourself from social engineering 

While these examples are scary, there are things you can do to protect yourself online.  

 

Limit what you share 

The first step in protecting yourself is to be mindful of the personal information you share online. This means limiting the details you provide about your work, your daily routines, and your personal life. For example, avoid posting sensitive information about your workplace or projects you’re working on. 

 

Tighten privacy settings 

It’s always a good idea to make sure that your social media accounts are set to private. Many platforms allow you to control who can see your posts, so make sure you're only sharing content with people you trust. Regularly review and update your privacy settings to ensure that you're not exposing more information than necessary. 

 

Be careful with security questions 

Security questions may seem like a good way to add an extra layer of protection to your accounts, but they often rely on information that’s easy to find online. Questions like “What’s your mother’s maiden name?” or “What’s the name of your first pet?” can be answered through a quick search of your social media profiles. Consider using a password manager with strong, unique passwords and enable multi-factor authentication for added security.   Bonus tip: Choose three random words for your password, and include numbers, capitals, and symbols. 

 

Avoid relying on ai for passwords 

AI-powered password managers can be helpful, but they shouldn’t be your only line of defence. A hacker could potentially guess your passwords if they gain enough information about you through OSINT. Always use a combination of strong passwords, multi-factor authentication, and unique login credentials for different accounts. 

 

Think before you post 

This might seem like a simple tip, but it’s really important. Before sharing anything online, pause and think about the potential risks. Could this post reveal something personal? Could a hacker use this information to craft a targeted attack? If you’re unsure, it’s better to err on the side of caution and keep it private. 

 

 

Need help with your organisation’s cybersecurity? Contact us today to find out how we can help.  

コメント


The contents of this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of The Cyber Resilience Centre for the West Midlands is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others.  Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. The Cyber Resilience Centre for the West Midlands provides affordable services and Trusted Partners if you need specific support. For specific questions please contact us.

 

The Cyber Resilience Centre for the West Midlands does not accept any responsibility for any loss which may arise from reliance on information or materials published on this document. The Cyber Resilience Centre for the West Midlands is not responsible for the content of external internet sites that link to this site or which are linked from it.

The contents of this website are provided for general information only and are not intended to replace specific professional advice relevant to your situation. The intention of The Cyber Resilience Centre for the West Midlands is to encourage cyber resilience by raising issues and disseminating information on the experiences and initiatives of others.  Articles on the website cannot by their nature be comprehensive and may not reflect most recent legislation, practice, or application to your circumstances. The Cyber Resilience Centre for the West Midlands provides affordable services and Cyber Essentials Partners if you need specific support. For specific questions please contact us.

 

The Cyber Resilience Centre for the West Midlands does not accept any responsibility for any loss which may arise from reliance on information or materials published on this document. The Cyber Resilience Centre for the West Midlands is not responsible for the content of external internet sites that link to this site or which are linked from it.

WMCRC Logo New white.webp

The Cyber Resilience Centre for the West Midlands is a trusted resource for  support to protect businesses and third sector organisations in the West Midlands region.

USEFUL LINKS

CONNECT WITH US

  • Facebook
  • LinkedIn
  • X

© 2024 The Cyber Resilience Centre for the West Midlands

bottom of page