How fraudsters manipulate: cyberpolice warns about social engineering
01.08.2024 14:17Cyber police officer Vitalii Kuzmenko, rap artist Alyona Alyona, IT and data protection specialist Vitalii Yakushev, and director of the Media Analytics Center "Cyber Media Track" Anastasiia Kondryko talked about common fraud methods and how to resist their psychological influence and manipulations in the latest episode of the project "Cybersecurity.UA".
What is social engineering?
Social engineering studies human behavior and the factors that influence it, and it is not a type of fraud in itself. However, fraudsters use social engineering techniques to manipulate victims into voluntarily giving money, providing necessary information, or performing certain actions.
"Clicking on a particular link, downloading and opening a certain file – these are all actions that manipulate a person into doing something they would not do without manipulation," says Vitalii Kuzmenko, Deputy Head of the Operational Support and Analysis Department of the Cyber Police Department of the National Police of Ukraine.
Experts also highlight the "reverse social engineering" method. This type of attack is aimed at creating a situation in which the victim is forced to contact the attacker for help. For example, a fraudster may send an email with phone numbers and contacts, allegedly from a support service, and later create problems on the victim's computer and wait for their call.
How to counteract fraudsters using social engineering methods online:
-
Be critical of any offers from strangers, especially enticing ones.
-
Do not panic and do not rush to do what you are asked or even demanded to do.
-
Be vigilant with unknown links and attachments – do not open them unless necessary.
-
Do not work with personal data in the presence of strangers, especially with card details (number, expiration date, CVV code, PIN code), online banking login passwords, or any other passwords and codes sent in SMS messages.
-
Install and update antivirus software.
-
Use different passwords for personal and corporate emails, social networks, and banking applications.
Even this minimal set of advice and rules will significantly enhance your cybersecurity, police warn.
Learn more about what social engineering is:
-
02.03.2026
Update of infrastructure resource rates from April 1, 2026
From April 1, 2026, server resource rental tariffs are updated. Check the new server prices (from XS to 7XL), specifications, and connection conditions.
-
15.02.2026
Service agreement from February 16 as a single format of technical support
From Feb 16, Torgsoft support switches to the Service Maintenance Agreement. Tickets are cancelled. Learn about SMA terms, time tracking, and service procedures.
-
27.01.2026
Grant for generators and charging stations for sole proprietors
Grant for sole proprietors for generators and charging stations will help ensure business autonomy during blackouts. Support for small businesses








Go back to the previous step