All they then need to do is a quick internet search and the groups have completed their “social engineering” file: company codes, logos, payroll, sometimes even “A Word from the Director” … and have a complete vision of the company, its language, trademarks, etc. The criminal group then gets hold of the e-mail addresses, fax and telephone numbers to be able to communicate with the future victim without leaving any traces.
So the criminal group has all the information it needs to target a company. There is no doubt that new technologies have made the “social engineering” stage so much easier.