Usually, impersonators gather information by social engineering and then patiently wait to put pieces of information together and then stitch them. Thus, even a small piece of information serves as a connecting part of the puzzle.
Common social engineering methods include the following:
- Stalking
- Crawling compromised sites
- Sending phishing emails
- Dumpster diving
- Eavesdropping
- Tailgating
- Shoulder surfing
- The use of USB devices loaded with malware and many more