What is a Pretexting Attack?

by

September 22, 2022

Pretextingis form of social engineering in which an attacker tries to convince a victim to give up valuable information or access to a service or system.

The distinguishing feature of this kind of attack is that the scam artists comes up with a story — or pretext — in order to fool the victim.

The pretext generally casts the attacker in the role of someone in authority who has the right to access the information being sought, or who can use the information to help the victim.

 

How to stop a baiting attack:

Slow down and control your emotions

Remember the attacker is trying to manipulate your emotions into making a quick reaction. The more time you take to think about the situation the more likely you’ll start to realize something’s up.

We might be animals when it comes to our emotions, but we’re also brilliant. By slowing down, our rational brain allows us to overcome our feelings.

 

Think about what you’re reading, seeing, and hearing

The more time you give yourself for rational thought, the better off you are when it comes to seeing through the attacker’s ruse.

Look for things like strange word choices or misspellings. Look for visual clues like off-brand graphics (if it comes from someplace like your bank or a store you frequent).

You’re more astute than you might give yourself credit for. If something seems off, it probably is.

 

Check to see who sent the message

Email masking is incredibly prominent in today’s world. Most email clients format the sender address so that it’s easier to discern who it’s from. The problem is attackers leverage this.

If you’ve got the feeling the message you’re reading isn’t on the level check to see who sent it. If the name is familiar, but the email address isn’t there’s a good chance you’re experiencing a social engineering attack.

 

Don’t follow blind links

Links are easy to hide, just like email addresses. If you can’t discern where a web-link is going to send you don’t click on it.

Always make sure to hover or right-click on an email link (whatever your email client is set up for) to see where it might send you.

 

Be Wary of attachments

If you’ve gone through the steps mentioned above, you probably know what I’m going to say here. Don’t download attachments from people you don’t know.

Sometimes it’s a bad idea to download attachments from people that you do. Be on the lookout for e-mail attachments that appear to be Microsoft Word or Excel files. They might contain pretty nasty surprises.

Interested in learning more or exploring your business cybersecurity position? Schedule a free consultation with Integris today.

Carl Keyser is the Content Manager at Integris.

Keep reading

How Can Managed IT Services Improve my Business Security?

How Can Managed IT Services Improve my Business Security?

How Can Managed IT Services Improve my Business Security: The Quick Take Managed IT services provide a comprehensive solution for businesses looking to enhance their security posture. By partnering with a Managed IT Service Provider (MSP), companies can outsource...

What Can Cybersecurity Awareness Training Do for My Company?

What Can Cybersecurity Awareness Training Do for My Company?

Global spending on employee cybersecurity awareness training is predicted to exceed $10 billion USD by 2027, up from around $5.6 billion USD in 2023, according to the latest estimates from Cybersecurity Ventures. Why? Because more companies than ever are realizing...

Four Social Engineering Hacks You Need to Prevent in 2024

Four Social Engineering Hacks You Need to Prevent in 2024

The Anti-Phishing Working Group (APWG) reports over 963,000 unique phishing sites worldwide were detected in the first quarter of 2024, collectively sending out billions of spam emails a day. Is this number scary? You bet. But it's the growing sophistication of these...