top of page

From Phishing to Deepfakes: How Social Engineering Has Evolved

  • Writer: All Things Being ISOs
    All Things Being ISOs
  • Sep 4
  • 4 min read
Hands typing on a laptop with a luminous green data-filled screen, set in a vibrant violet-lit room, conveying a tech-focused mood.

Social engineering - the practice of manipulating individuals to gain unauthorised access to systems or information - has evolved rapidly over the past two decades. What once consisted of poorly written scam emails now includes deepfake audio, SMS fraud, and AI-generated messages that closely mimic real people.


The rise of these techniques has made it increasingly difficult for even tech-savvy individuals to detect manipulation. In this article, we’ll explore the evolution of social engineering, the psychological tactics it exploits, and the practical steps organisations can take to stay protected.


Phase 1: The “Obvious” Phishing Email Era

In the early 2000s, phishing attacks were crude but widespread. They often featured:


  • Poor spelling and grammar

  • Generic greetings

  • Promises of financial windfalls (e.g. the infamous “Nigerian prince” scams)

  • Free email addresses such as banksecurity@hotmail.com


These emails were easy to spot and became the subject of widespread public ridicule. However, they marked the beginning of a broader trend: targeting the human element, not just the technical.


Phase 2: Spear Phishing – Personalised Attacks

By the 2010s, attackers had refined their methods. Instead of casting a wide net, they began researching specific individuals to craft more convincing messages.


Known as spear phishing, these attacks might reference:


  • Recent business trips or events

  • A company’s internal structure

  • Specific individuals or projects


For example, an attacker might email a finance officer claiming to be the CFO, asking for an urgent wire transfer. The tone, language, and context often appear legitimate - making these scams much harder to detect.


Phase 3: Smishing and Vishing – The Mobile Shift

As awareness of email scams increased, attackers turned to mobile channels:


  • Smishing involves fraudulent SMS messages, often impersonating delivery services, banks, or tech platforms:“Your account has been suspended. Tap here to verify.”

  • Vishing (voice phishing) uses phone calls or recorded messages pretending to be from government bodies or tech support teams. These calls may request payment or remote access to a device.


These methods are effective because mobile devices feel more personal and immediate - and many users are less cautious when responding to texts or calls than emails.


Phase 4: Deepfakes and AI-Driven Deception

The latest - and most concerning - development in social engineering is the use of artificial intelligence to create deepfakes. These can include:


  • Audio generated to match a person’s voice

  • Video clips mimicking a real individual’s appearance and speech

  • AI-written emails or texts that mirror an individual's tone or style


This allows attackers to impersonate CEOs, colleagues, or family members with alarming accuracy. For example, a fake voicemail from a line manager could request an urgent purchase or password reset. Some deepfakes have even been used to manipulate financial markets by impersonating executives in fabricated announcements.


Why Social Engineering Works: The Psychology Behind It

Successful social engineering attacks exploit universal human traits:


  • Trust in authority - We’re conditioned to follow instructions from senior staff or institutions

  • Sense of urgency - Phrases like “act now” reduce time for rational decision-making

  • Familiarity and personalisation - Using names, references, or tone to build credibility

  • Fear of consequence - Threatening account closures, job loss, or legal action


These emotional levers can override logic - even among experienced professionals.


Practical Steps to Protect Against Social Engineering

Organisations and individuals can take proactive measures to defend against these tactics:


1. Verify Requests via Known Channels

If you receive a request involving financial transactions, login credentials, or gift cards - verify it independently via a trusted method. Don’t reply directly or click embedded links.


2. Slow Down

Attackers rely on panic and urgency. Encourage employees to pause, evaluate, and question unexpected requests.


3. Strengthen Authentication

Use multi-factor authentication (MFA) wherever possible. Even if a password is compromised, MFA adds a critical layer of security.


4. Reduce Your Digital Footprint

Avoid oversharing online. Details such as job titles, contact info, or travel plans can be used to craft convincing attacks.


5. Train Your Team Regularly

Provide security awareness training that includes real-world examples of phishing, smishing, vishing, and deepfakes. Simulated phishing campaigns can help assess and improve readiness.


6. Protect Communication Tools

Ensure internal communication platforms (e.g. Teams, Slack, Zoom) are secured with strong credentials and access controls. These are increasingly being targeted.


7. Develop an Incident Response Plan

Establish clear protocols for reporting suspected phishing attempts or fraud. Early reporting can reduce damage.


Conclusion: In a World of AI-Enhanced Deception, Critical Thinking Is Your Best Defence

The methods of social engineering have changed, but the objective remains the same: exploit human trust to gain access, steal data, or cause disruption.


Businesses must not only invest in technical defences but also in human awareness and behavioural change. In a world where even voices and faces can be faked, vigilance is no longer optional - it’s essential.


Train your team. Test your systems. Question the unexpected. And always verify, no matter how real it seems.


A message from our sponsors, The Ideas Distillery


If you would like to look at how to implement an ISO 27001 information security management system, then simply contact us.


Or, if you want to see what's involved in more detail, then get a completely free, no obligation, totally tailored ISO Gap Analysis for your business (only available to UK businesses).

Comments


bottom of page