Pretexting

Attacker creates a fabricated scenario to manipulate or deceive someone into divulging confidential information

Diversion Theft

Manipulating a situation or creating a distraction to steal valuable information
e.g. DNS Spoofing Attack

Hoax

Malicious deception that is often spread through social media and other communication
Mostly paired with Phishing Attacks and Impersonation Attack

Shoulder Surfing

Looking over someone’s shoulder to gather personal information

Dumpster Diving

Searching through trash to find valuable information
Digital dumpster diving going through deleted files on disk

Eavesdropping

Secretly listening to private conversations
e.g. MITM, Wire taps

Baiting

Planting a malware-infected device for a victim to find and unintentionally infect a system

Piggybacking & Tailgating

Often used by insiders to access offices and restricted area without leaving any track

Piggybacking
Person with authorized access allows another person without authorization to enter an secure area with them

Tailgating
Unauthorized person follows someone with legitimate access to a secure space without their knowledge or consent