Why do cyber attackers commonly use social engineering attacks
Content on WhatAnswers is provided "as is" for informational purposes. While we strive for accuracy, we make no guarantees. Content is AI-assisted and should not be used as professional advice.
Last updated: April 8, 2026
Key Facts
- 98% of cyber attacks involve social engineering elements
- Phishing accounted for 36% of data breaches in 2023 (Verizon DBIR)
- Business email compromise caused $10.3 billion in losses 2013-2022 (FBI IC3)
- First documented phishing attack occurred in 1995 targeting AOL users
- 90% of successful cyber attacks start with phishing emails
Overview
Social engineering attacks represent a fundamental shift in cybersecurity threats, moving from purely technical exploits to psychological manipulation of human targets. The concept dates back to the earliest days of computing, but gained prominence in the mid-1990s with the first documented phishing attack against AOL users in 1995. These attacks evolved through the 2000s with the rise of spear-phishing targeting specific individuals, and further sophisticated with the advent of social media platforms that provide attackers with personal information for customization. The 2010s saw the emergence of business email compromise (BEC) scams, which the FBI's Internet Crime Complaint Center reported caused over $10.3 billion in losses between 2013 and 2022. Today, social engineering encompasses multiple techniques including phishing, pretexting, baiting, quid pro quo, and tailgating, with attackers increasingly leveraging artificial intelligence to create more convincing fraudulent communications.
How It Works
Social engineering attacks operate through a systematic process that exploits fundamental aspects of human psychology and organizational behavior. The attack typically begins with information gathering, where attackers research targets through social media, company websites, or data breaches to identify vulnerabilities and craft convincing scenarios. Next comes the establishment of trust, where attackers impersonate legitimate entities through spoofed emails, fake websites, or phone calls using techniques like caller ID spoofing. The exploitation phase leverages psychological principles such as authority (pretending to be executives), urgency (creating time pressure), or reciprocity (offering something in return) to manipulate targets into taking actions like revealing passwords, transferring funds, or installing malware. Modern attacks often use multi-vector approaches, combining email, phone, and social media to increase credibility, with some sophisticated campaigns employing AI-generated voice and video deepfakes to bypass traditional security measures.
Why It Matters
Social engineering matters profoundly because it represents the weakest link in cybersecurity defenses—human psychology—making traditional technical security measures insufficient. These attacks cause substantial financial damage, with the FBI reporting that business email compromise alone resulted in $2.7 billion in losses in 2022. Beyond financial impacts, successful social engineering can lead to massive data breaches affecting millions of individuals, as seen in the 2020 Twitter Bitcoin scam that compromised 130 high-profile accounts. The techniques undermine organizational security at fundamental levels, with 90% of successful cyber attacks beginning with phishing emails according to security firm Cofense. As remote work increases attack surfaces and AI makes fraudulent communications more convincing, understanding and defending against social engineering has become essential for both organizational security and individual privacy protection in the digital age.
More Why Do in Technology
- Why do we call file systems a tree when they can have symbolic links
- Why does my PR approval keep getting dismissed even when nothing changes
- Why do actors get paid so much
- Why do aeroplanes leave a trail
- Why do airpods keep disconnecting
- Why do ai data centers use so much water
- Why do ajummas have curly hair
- Why do agentic ai systems require more caution in the workplace than basic genai tools
- Why do my ears hurt from airpods
- Why do airpods make noise
Also in Technology
More "Why Do" Questions
Trending on WhatAnswers
Browse by Topic
Browse by Question Type
Sources
- Social engineering (security)CC-BY-SA-4.0
Missing an answer?
Suggest a question and we'll generate an answer for it.