Governments' Guide to Social Engineering
This talk analyzes the application of Robert Cialdini's seven principles of psychological influence by both cybercriminals and government actors. It demonstrates how techniques like reciprocity, scarcity, authority, and social proof are leveraged to manipulate targets at scale. The presentation highlights the convergence of cyber-attack methodologies and state-sponsored propaganda, emphasizing the critical need for awareness in the digital security landscape.
Why Your Next Phishing Campaign Needs to Move Beyond Technical Payloads
TLDR: Social engineering remains the most effective vector for initial access, yet many security professionals treat it as a secondary concern compared to technical exploits. This analysis of psychological manipulation techniques demonstrates how attackers mirror state-sponsored propaganda to bypass human skepticism. By mapping Cialdini’s principles of influence to common TTPs, researchers can design more realistic simulations that actually test organizational resilience.
Security professionals often obsess over zero-days, complex chain exploits, and misconfigured cloud buckets. While those vulnerabilities are critical, they are rarely the primary entry point for a motivated adversary. The most reliable way to gain a foothold in a hardened environment is still the human element. If you are running red team engagements or bug bounty programs, you know that a well-crafted phishing campaign often yields results where automated scanners fail. The recent research presented at BSides London 2025 serves as a necessary reminder that our adversaries are not just hacking networks; they are hacking the cognitive biases that govern human decision-making.
The Mechanics of Psychological Exploitation
Attackers do not need a novel exploit if they can convince a user to hand over their credentials voluntarily. The core of this problem lies in the application of Robert Cialdini’s seven principles of psychological influence. These are not just academic concepts; they are the blueprint for high-conversion social engineering.
Consider the principle of reciprocity. In a digital context, this is the "free gift" trap. An attacker might send an email promising a reward or access to a restricted document in exchange for a simple action, such as clicking a link or filling out a form. The victim feels a subconscious obligation to return the favor. When you are designing a phishing simulation, stop using generic "password reset" templates. Instead, build a scenario where the user receives something of perceived value. If the target is a developer, offer a "free" tool or a "confidential" documentation update. The goal is to trigger that social contract.
Scarcity is another powerful lever. Ransomware operators have mastered this by creating artificial time pressure. By displaying a countdown timer on a payment portal, they force the victim into a state of panic where rational decision-making is replaced by the need to avoid a perceived loss. As a pentester, you can simulate this by creating a sense of urgency in your lures. Use language that implies a limited window of opportunity to address a "critical security finding" or "expiring access token."
Mapping Influence to Attack Flows
The most dangerous aspect of these techniques is how easily they scale. When you look at T1566, you see the technical classification of phishing, but the real work happens in the payload delivery. Whether it is T1566.001 (spearphishing attachment) or T1566.002 (spearphishing link), the success rate depends on the credibility of the pretext.
Authority is the ultimate bypass for skepticism. If an email appears to come from a C-level executive or a known IT support alias, the victim is significantly less likely to inspect the headers or verify the sender's domain. This is where OWASP A07:2021-Identification and Authentication Failures becomes relevant. If your organization relies on weak authentication, a single successful social engineering attack can lead to full account takeover.
To test this effectively, you must move beyond simple link-clicking metrics. During an engagement, track how many users report the email versus how many interact with it. If you are using a tool like GoPhish, customize your landing pages to reflect the internal branding of the target company. If you can make the user feel like they are part of a "tribe"—a concept known as the Unity principle—you significantly increase your chances of success. People are hardwired to trust those they perceive as being part of their group, whether that is a family, a religious organization, or a professional team.
The Convergence of Propaganda and Cyber Attacks
What makes this research particularly compelling is the observation that state-sponsored actors use the exact same psychological frameworks as common cybercriminals. The difference is the scale and the objective. While a criminal wants your credit card number, a state actor wants to shift your perception of reality.
We see this in the way propaganda is disseminated across social media platforms. The tactics are identical: create a sense of urgency, leverage authority figures, and build a narrative that forces the audience to choose a side. When you are performing a red team exercise, consider how these broader influence campaigns might affect your target. Are there specific political or social issues that could be used as a pretext for your phishing lures? While this requires a delicate touch, it is the most accurate way to simulate the threat landscape that modern organizations face.
Strengthening the Human Firewall
Defenders often focus on technical controls like DMARC, SPF, and DKIM to prevent email spoofing. These are necessary, but they are not sufficient. If an attacker can register a look-alike domain or compromise a legitimate third-party account, those technical barriers vanish.
The only way to mitigate the risk of sophisticated social engineering is to foster a culture of healthy skepticism. This means training employees to recognize the signs of manipulation, not just the signs of a malicious link. Encourage your team to verify requests through out-of-band communication channels. If a request seems urgent, unusual, or comes from an unexpected source, the default action should be to pause and verify.
Stop treating social engineering as a "soft" skill. It is a technical discipline that requires as much rigor as exploit development. The next time you are planning an engagement, look at the psychological landscape of the target organization. Identify the biases that are most likely to be exploited and build your campaign around them. If you can break the human, you have already won the battle for the network.
Vulnerability Classes
Target Technologies
OWASP Categories
All Tags
Up Next From This Conference

From Chaos to Calm: Mastering InfoSec Audits

Beginner's Guide To Malicious Browser Extensions

If I Can Do It, So Can They: Lessons From Building A Phishing Simulation Tool And The Rise Of Phishing-as-a-Service
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

