Reverse Social Engineering: When the Attacker Becomes the Expert You Trust

In conventional social engineering, the attacker pretends to be a user who needs help. In Reverse Social Engineering, the attacker creates a persona of authority — a technician or IT admin — so that employees approach the attacker asking for assistance, voluntarily providing sensitive information.

Social Engineering vs Reverse Social Engineering

ApproachAttacker RoleInformation Flow
Social EngineeringPretends to be a user who lost accessAttacker asks → Employee provides
Reverse Social EngineeringPretends to be IT support / authority figureEmployee asks → Attacker receives

The Three-Step Attack Cycle

  1. Sabotage: Attacker corrupts a workstation, creating a problem that requires help.
  2. Marketing: Attacker leaves business cards or embeds their contact number in the error message, ensuring the victim calls them.
  3. Support: Attacker “solves” the problem through conversation, drawing out required information while the victim remains unsuspicious.

Prevention Guidance

  • Education is the single most effective defence.
  • Users should never provide account information without explicit supervisor authorisation.
  • Establish official IT support channels — all support contacts must go through them.
  • All employees should be included in security awareness training.
  • Suspicious behaviour should always be reported, regardless of how authoritative the person seems.


Leave a comment