Pretexting in cyber security is commonly used but not widely known. When employees don’t know what pretexting is – or how convincing it can be – it makes them more vulnerable to the tricks of a cyber criminal.
By teaching your team members the definition, applications, and examples of pretexting, they’ll be prepared to identify pretexting in any situation and stop a scam before it goes too far. In this blog, we’ll be covering all of these topics and sharing examples along the way. Let’s get into it:
Pretexting is a social engineering technique where an attacker creates a fake scenario to deceive an individual into providing confidential information. Unlike other forms of phishing that often rely on fear or urgency, pretexting takes longer and involves building trust with the target. The attacker typically pretends to be someone in a position of authority or someone the target knows, such as a co-worker, a bank representative, or a government official.
Photo by Marília Castelli on Unsplash
For just $325 USD, you can run a 6 week, automated program for gamified phishing awareness training and challenges. (Limited time offer. Normally valued at $999 USD)
Use Promo Code: 6WEEKS
Take proactive steps to invest in your business’s cyber resilience now to protect your organization from costly data breaches and disruptions. Start easily with our Quickstart Training Bundles. To learn more CLICK HERE.
The goal of pretexting is to gather information that can be used to access systems, steal identities, or commit fraud. This information can include passwords, social security numbers, bank account details, or other personal data.
For example, when you get a fake call from the CRA saying you need to pay a fee, the scammer may say the last few digits of your SIN number. The scammer pretending to be a CRA agent, having your phone number, SIN, and any other information is “pretexting”. They hope that by creating a believable story, you’ll give them information they can sell on the black market or use to access your financial accounts.
As a non-security professional you’ll rarely see the term pretexting. It may come up in your security awareness training, but most importantly knowing what pretexting is can help you identify when pretexting is happening to you.
Pretexting will be used by a cyber criminal in any social engineering scenario. When you receive a phone call, see someone you don’t recognize at the office, or get texts from a brand you could be experiencing pretexting.
Now that you understand what pretexting is, let’s learn how to spot it before the cyber criminal can get to your personal information. Here are some key red flags that could mean something is pretexting:
One of the most famous cases that serves as an example of pretexting is the MGM attack from 2023. The cyber attack led to week-long issues for room keys and virtual gambling machines, completely disrupting the operations of the entertainment giant.
The attack was claimed to have begun after a cyber criminal found information about an employee on LinkedIn and called the Help Desk using the found information to impersonate the employee. The attacker gave enough information and built enough trust (pretexting) to convince the IT Desk employee to give them access to an account. They used this access to detonate ransomware and demand ransom.
Pretexting is a sophisticated and manipulative tactic used by cybercriminals to gain access to sensitive information. By understanding what pretexting is, where it is likely to occur, and how to recognize the signs, you can better protect yourself and your organization from falling victim to these deceptive schemes. Stay informed about related terms and always practice caution when dealing with unsolicited requests for information. Awareness and vigilance are your best defences against pretexting and other forms of social engineering attacks.