Press "Enter" to skip to content


Last updated on May 10, 2022

Understanding Baiting and How to Avoid It

“Congratulations! You are the lucky winner of…”

“Yay! We have a free gift for you, download it now.”

We’ve all seen these types of online schemes and most of us don’t engage with them. That’s good because this is a classic example of baiting, a type of social engineering attack that can compromise your personal or organizational cybersecurity.

What Is Baiting in Social Engineering?

As mentioned above, baiting is a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware. Baits are very attractive and enticing, not to mention manipulative, and their end goal is to infect your system and gain access to personal information.

Attackers who practice baiting use physical devices and enticing offers that appeal to people’s curiosity or need to trap them and get what they want from their victims. In many ways, baiting is similar to phishing attacks, but overall, it’s different from most social engineering attacks. Why? Because these attacks offer something free that’s relevant to the target.

Who is most likely to be targeted by baiting?

Anyone can be a target of baiting, but there are certain groups of people who are more likely to be targeted than others. These include people who are curious by nature, those who are easily gullible, and those who are looking for a quick fix or easy solution. Children and teenagers are also often targeted by baiting attacks, as they are more likely to take the bait without thinking about the consequences.

Most Common Baiting Techniques: Exploiting Human Curiosity

There are many different types of baiting techniques, but they all share the same goal: to exploit the victim‘s trust and curiosity in order to gain access to their systems or data.

Tempting Offers

One of the most common baiting techniques is what we just explained above. You will receive tempting offers, whether that’s via ads, email, or social media, of downloadable content that’s free. They will offer users free music, movie downloads, a free digital audio player, or any other downloadable content.

Malware-Infected Devices

The second most common baiting technique is using malware-infected flash drives or USB drives. Once targeted employees insert these devices into company computers, malware will be automatically installed on their system and infect the company’s network.

Attackers will leave these infected devices in conspicuous areas, such as the company lobby, where targeted employees can see them and insert them into company computers to spread malicious code. It’s also not uncommon for infected flash or USB drives to be delivered directly to the target under false pretenses.

They can also send innocent-looking devices to employees as a reward placed in gift baskets. Additionally, they can practice strategic placement and use intriguing labels to temp employees. Attackers can also pretend to be from technical support and instruct employees to insert tainted devices into their work computers.

Techniques to Prevent Baiting on Network Connected Computers

The most effective defense against baiting is education and awareness. That’s why it’s essential to prepare employees, so teach them to identify different kinds of attacks and provide instructions. They can also create policies that prohibit employees from accepting gifts from strangers or clicking on links from unknown sources. This is very important for company security.

You can also prevent baiting by being wary of tempting offers and not plugging unknown devices into your computer. If something looks or sounds too good to be true, it probably is. Search on Google before you take the bait.

Additionally, you should disable autorun on your computer, which is the feature that automatically runs programs on devices you’ve inserted into your drive even if they’re secure.

Do these things and you will develop a strong security culture!

Be First to Comment

    Leave a Reply