What is the social engineering technique Steve employed in the above scenario?

Steve, an attacker, created a fake profile on a social media website and sent a request to Stella. Stella was enthralled by Steve’s profile picture and the description given for his profile, and she initiated a conversation with him soon after accepting the request. After a few days. Sieve started asking about her company details and eventually gathered all the essential information regarding her company.

What is the social engineering technique Steve employed in the above scenario?
A . Diversion theft
B . Baiting
C . Honey trap
D . Piggybacking

Answer: B

Subscribe
Notify of
guest
1 Comment
Inline Feedbacks
View all comments
jf
jf
3 years ago

Honey Trap.
Attacker pretended to be an attractive person to victim to steal information. Baiting involves tempting the victim with something attractive in exchange for information