{"id":4645,"date":"2024-03-04T09:45:00","date_gmt":"2024-03-04T09:45:00","guid":{"rendered":"https:\/\/mintivo.co.uk\/?p=4645"},"modified":"2024-02-28T14:56:33","modified_gmt":"2024-02-28T14:56:33","slug":"what-is-baiting-in-cyber-security","status":"publish","type":"post","link":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/","title":{"rendered":"What is Baiting in Cyber Security?"},"content":{"rendered":"\n

Have you ever received a suspicious email? The kind of email that might say you\u2019ve won some money, or maybe even an email from a \u201cfamily member\u201d or \u201cfriend\u201d telling you to buy an amazing product, by simply opening the attached file or clicking on the link they helpfully provide?<\/p>\n\n\n\n

These are examples of baiting, a tactic used to trick people into giving their personal data or information (such as bank details) to malicious, unsafe sources.<\/p>\n\n\n\n

Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.<\/p>\n\n\n\n

What is baiting in social engineering?<\/h2>\n\n\n\n

Social engineering is the process baiting attackers use to hack into your company\u2019s software, breaching its data and computer systems. These are the three steps they take to get your information:<\/p>\n\n\n\n

    \n
  1. For a targeted attack on an individual, the social engineer (or baiting attacker) researches online and collects as much information as they can on their target, such as their name, social media accounts and interests. For a general attack, assumptions about how a group of people might respond to a provocative false approach is made, for example, fear or excitement.<\/li>\n\n\n\n
  2. With this knowledge in mind, they bait the victim or victims by pretending to be someone they\u2019re not. While using this identity, they will try to manipulate the victim to share their personal information<\/li>\n\n\n\n
  3. Once the baiter has socially engineered the situation to get what they want from their victims, they will have all the information they need to access personal or sensitive data<\/li>\n<\/ol>\n\n\n\n

    How does baiting work?<\/h2>\n\n\n\n

    Baiting, as the name suggests, is designed to lure their victims in with something that will appeal to them, or catch their interest to the point of pursuing the bait to find out more. A bit like bait on the end of a fishing rod, it looks tasty but isn\u2019t good for the fish! There are a few common baiting attacks you should watch out for.<\/p>\n\n\n\n

    Abandoned USB<\/h3>\n\n\n\n

    A bait attacker will leave a malware-infected USB for people to find. This is in the hope that they will plug it in, perhaps to try and find the owner or to see what\u2019s on it. Whatever their motivation may be, if the malware-infected USB is plugged into a computer, the infectious malware can spread silently through the computer system, damaging it and accessing information to target people in their contacts.<\/p>\n\n\n\n

    Phishing<\/h3>\n\n\n\n

    This may be the most commonly known baiting attack. Attackers may take on different identities such as a family member, friend, co-worker or even a technical support assistant, to gain your trust. The phisher can find your contacts once they have hacked into your email account. Examples of baiting in these areas have included a scammer pretending to be a child, reaching out to a parent asking for money to help them get back home; a contact sending a link and telling you to click it for a reward or a co-worker asking you to phone them on the attached phone number in a work email.<\/p>\n\n\n\n

    Quid Pro-Quo<\/h3>\n\n\n\n

    In this baiting attack, the attacker contacts their victim asking for something and offering something to them in return. A common example of this is the bait attacker pretending to be a member of IT support, calling around a company until they can find someone with a problem who needs fixing. When they find their victim, they then give them instructions that put malware into the victim\u2019s computer, compromising it and making its private information available for the attacker to access.<\/p>\n\n\n\n

    How to Deal with a Baiting Attack<\/h2>\n\n\n\n

    So much of our lives are online, which means you may have encountered this kind of scam before. However, you may still be uncertain of how to deal with it safely and effectively.<\/p>\n\n\n\n

    Educate<\/h3>\n\n\n\n

    Educate yourself<\/a> on baiting attacks. Learn what\u2019s out there and how to avoid the attacks. By making yourself aware of existing scams and how they work, you will be better equipped to recognise other baiting attacks that may have come your way and know how to deal with them. Reading this article is a great start!<\/p>\n\n\n\n

    Be vigilant<\/h3>\n\n\n\n

    Watch out for suspicious features in a baiting attack, such as awkward or bad grammar; low quality or slightly altered logos on websites; urgent or emotional requests; and random offers of help online.<\/p>\n\n\n\n

    Ask questions<\/h3>\n\n\n\n

    Don\u2019t be afraid to question something. If you\u2019ve received a message from someone in your contacts, but their writing voice doesn\u2019t sound like them, or what they\u2019re offering sounds too good to be true, google it so you know. Try and find a different way of contacting them, which you know has worked in the past, for example, a different email address, phone number or platform, such as WhatsApp.<\/p>\n\n\n\n

    Report<\/h3>\n\n\n\n

    Report the attack and block the sender. If you\u2019ve received a baiting attack in your work inbox, then report it to your IT team, so they can stop your co-workers from receiving similar emails if they haven\u2019t already. They can also put out a group email to everyone alerting them of the attack, once they have confirmed it is one. If it\u2019s in your personal email or text messages, simply block them and mark them as spam.<\/p>\n\n\n\n

    Disable autorun<\/h3>\n\n\n\n

    Disable autorun on your computer. Autorun runs programs on a device as soon as you\u2019ve plugged it in, potentially allowing baiting attacks into your computer.<\/p>\n\n\n\n

    Don\u2019t use unknown devices<\/h3>\n\n\n\n

    Don\u2019t plug in any unknown devices into your laptop. If you\u2019re concerned that someone has truly lost their USB, you can leave it in the place you found it. You can keep your own USB safe and returnable by labelling them on the outside, rather than putting your personal details on a document on the stick.<\/p>\n\n\n\n

    Keep your business secure from baiting attacks<\/h2>\n\n\n\n

    Now you know a little more about baiting attacks and how to protect yourself against one, we want you to know that Mintivo are here to help. We have experience of dealing with many different types of cyber attack, and we can help to protect your business from their dangers. If you would like to learn more about cyber security we would be very happy to help. We have a team of experts who can advise on how best to keep your business safe from baiting attacks and other cyber issues, please get in touch. We look forward to hearing from you.<\/p>\n","protected":false},"excerpt":{"rendered":"

    Have you ever received a suspicious email? The kind of email that might say you\u2019ve won some money, or maybe even an email from a \u201cfamily member\u201d or \u201cfriend\u201d telling you to buy an amazing product, by simply opening the attached file or clicking on the link they helpfully provide? These are examples of baiting, […]<\/p>\n","protected":false},"author":6,"featured_media":4646,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\nWhat is Baiting in Cyber Security? - Mintivo<\/title>\n<meta name=\"description\" content=\"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Baiting in Cyber Security? - Mintivo\" \/>\n<meta property=\"og:description\" content=\"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Mintivo\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-04T09:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-28T14:56:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Meg Fenner-Jamieson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Meg Fenner-Jamieson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\"},\"author\":{\"name\":\"Meg Fenner-Jamieson\",\"@id\":\"https:\/\/mintivo.co.uk\/#\/schema\/person\/bfe6cda04a900406cd95501793a3c91e\"},\"headline\":\"What is Baiting in Cyber Security?\",\"datePublished\":\"2024-03-04T09:45:00+00:00\",\"dateModified\":\"2024-02-28T14:56:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\"},\"wordCount\":1098,\"publisher\":{\"@id\":\"https:\/\/mintivo.co.uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\",\"url\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\",\"name\":\"What is Baiting in Cyber Security? - Mintivo\",\"isPartOf\":{\"@id\":\"https:\/\/mintivo.co.uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png\",\"datePublished\":\"2024-03-04T09:45:00+00:00\",\"dateModified\":\"2024-02-28T14:56:33+00:00\",\"description\":\"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.\",\"breadcrumb\":{\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage\",\"url\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png\",\"contentUrl\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mintivo.co.uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Baiting in Cyber Security?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mintivo.co.uk\/#website\",\"url\":\"https:\/\/mintivo.co.uk\/\",\"name\":\"Mintivo\",\"description\":\"IT support and services in England\",\"publisher\":{\"@id\":\"https:\/\/mintivo.co.uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mintivo.co.uk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mintivo.co.uk\/#organization\",\"name\":\"Mintivo\",\"url\":\"https:\/\/mintivo.co.uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mintivo.co.uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2022\/05\/mintivo-white.svg\",\"contentUrl\":\"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2022\/05\/mintivo-white.svg\",\"caption\":\"Mintivo\"},\"image\":{\"@id\":\"https:\/\/mintivo.co.uk\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/mintivo.co.uk\/#\/schema\/person\/bfe6cda04a900406cd95501793a3c91e\",\"name\":\"Meg Fenner-Jamieson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/mintivo.co.uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/068f6d7eb581e3673cd56db995497eb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/068f6d7eb581e3673cd56db995497eb1?s=96&d=mm&r=g\",\"caption\":\"Meg Fenner-Jamieson\"},\"url\":\"https:\/\/mintivo.co.uk\/news\/author\/meg-fenner-jamieson\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Baiting in Cyber Security? - Mintivo","description":"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/","og_locale":"en_GB","og_type":"article","og_title":"What is Baiting in Cyber Security? - Mintivo","og_description":"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.","og_url":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/","og_site_name":"Mintivo","article_published_time":"2024-03-04T09:45:00+00:00","article_modified_time":"2024-02-28T14:56:33+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png","type":"image\/png"}],"author":"Meg Fenner-Jamieson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Meg Fenner-Jamieson","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#article","isPartOf":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/"},"author":{"name":"Meg Fenner-Jamieson","@id":"https:\/\/mintivo.co.uk\/#\/schema\/person\/bfe6cda04a900406cd95501793a3c91e"},"headline":"What is Baiting in Cyber Security?","datePublished":"2024-03-04T09:45:00+00:00","dateModified":"2024-02-28T14:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/"},"wordCount":1098,"publisher":{"@id":"https:\/\/mintivo.co.uk\/#organization"},"image":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png","articleSection":["Blog"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/","url":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/","name":"What is Baiting in Cyber Security? - Mintivo","isPartOf":{"@id":"https:\/\/mintivo.co.uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage"},"image":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage"},"thumbnailUrl":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png","datePublished":"2024-03-04T09:45:00+00:00","dateModified":"2024-02-28T14:56:33+00:00","description":"Some baiting tactics are very easy to see, however, there are some that are very clever and if you aren\u2019t careful, you could be caught out.","breadcrumb":{"@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#primaryimage","url":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png","contentUrl":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2024\/02\/What-is-Baiting-in-Cyber-Security.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/mintivo.co.uk\/news\/what-is-baiting-in-cyber-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mintivo.co.uk\/"},{"@type":"ListItem","position":2,"name":"What is Baiting in Cyber Security?"}]},{"@type":"WebSite","@id":"https:\/\/mintivo.co.uk\/#website","url":"https:\/\/mintivo.co.uk\/","name":"Mintivo","description":"IT support and services in England","publisher":{"@id":"https:\/\/mintivo.co.uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mintivo.co.uk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/mintivo.co.uk\/#organization","name":"Mintivo","url":"https:\/\/mintivo.co.uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mintivo.co.uk\/#\/schema\/logo\/image\/","url":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2022\/05\/mintivo-white.svg","contentUrl":"https:\/\/mintivo.co.uk\/wp-content\/uploads\/2022\/05\/mintivo-white.svg","caption":"Mintivo"},"image":{"@id":"https:\/\/mintivo.co.uk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/mintivo.co.uk\/#\/schema\/person\/bfe6cda04a900406cd95501793a3c91e","name":"Meg Fenner-Jamieson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/mintivo.co.uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/068f6d7eb581e3673cd56db995497eb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/068f6d7eb581e3673cd56db995497eb1?s=96&d=mm&r=g","caption":"Meg Fenner-Jamieson"},"url":"https:\/\/mintivo.co.uk\/news\/author\/meg-fenner-jamieson\/"}]}},"_links":{"self":[{"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/posts\/4645"}],"collection":[{"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/comments?post=4645"}],"version-history":[{"count":3,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/posts\/4645\/revisions"}],"predecessor-version":[{"id":4649,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/posts\/4645\/revisions\/4649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/media\/4646"}],"wp:attachment":[{"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/media?parent=4645"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/categories?post=4645"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mintivo.co.uk\/wp-json\/wp\/v2\/tags?post=4645"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}