2 min read

What is pretexting?

What is pretexting?

Pretexting is a type of social engineering attack where the attacker creates a false story, thepretext,to trick a person into giving away sensitive information, money, or access.

 

Understanding pretexting

According to IBM, pretexting aims togain a victim’s trust and trick or manipulate them into sharing sensitive information, downloading malware, sending money to criminals or otherwise harming themselves or the organization they work for.The article further explains that "cybercriminals—and mere terrestrial criminals—might also use pretexting alone to steal valuable information or assets from individuals or organizations.

 

How does pretexting work?

According to IBM, pretexting relies on two core components:

  • Character: The fake identity the attacker adopts. To seem credible, the attacker will impersonate someone the victim trusts or feels obligated to obey, such as a boss, an IT staff member, a service provider, or even a personal contact. The goal is to appear legitimate, so the target is more likely to follow requests or divulge information.
  • Situation: This is the story or scenario the attacker creates to justify their request. The situation gives a reason for the character’s contact and makes the request seem plausible. It might be something generic likeyou must update your account details,or it could be a more personal storyline, such asI’m stuck and need your help.”

“The bad news is that there's no shortage of scenarios or sensitive data that can be leveraged by savvy social engineers,says Verizon. The attackers could gather information from social media and corporate websites. Additionally, cybercrime forums are teeming with stolen login credentials and personal and financial data.

 

What types of attacks does pretexting precede or form part of?

Pretexting is usually the first step in a larger cyberattack. When the attacker creates a believable story and gains the victim’s trust, they lay the groundwork for more damaging attacks. These include:

Phishing

According to IBM,Pretexting is common in targeted phishing attacks such as spear phishing, and whaling.

The impact is especially severe in healthcare. According to Paubox, phishing is the leading cause of healthcare data breaches, serving as the primary entry point for cybercriminals to compromise sensitive information. As of 2024, over 70% of healthcare data breaches originated from phishing attacks.

 

Baiting

Baiting relies on curiosity, greed, or urgency to entice victims into taking action. According to IBM,Scammers often use pretexting to make the bait more alluring.

Baiting examples include:

  • A USB drive labeledExecutive Salaries 2026left in a parking lot.
  • A downloadable file labeledUpdated Payroll Adjustments.”
  • A fake reward offer requiring login credentials.

 

Tailgating

Tailgating occurs when an unauthorized person gains access to a restricted area by following someone with legitimate access.Scammers use pretexting to make their tailgating attempts more successful—by, say, posing as a delivery person and asking an unsuspecting employee to open a locked door for them.”

 

Defending against pretexting

Organizations can defend against pretexting attacks by strengthening people, processes, and technology. According to a Verizon article, defending against pretexting involves:

  • Training employees on how to identify the warning signs of pretexting.Courses should run continuously, include real-world simulations and last only 10-15 minutes.”
  • Using simulation exercises with login banners and regular emails.
  • Deploying multi-factor authentication (MFA) to reduce the risk of password theft.
  • Updating and patching software.
  • Installing anti-malware, including phishing protection.
  • Deploying Domain-based Message Authentication, Reporting, and Conformance (DMARC).
  • Using AI-powered email protection, such as Paubox’s Inbound Email, which can identifysuspicious writing styles and email behavior indicative of account takeover.”
  • Updating business procedures to require approval from multiple team members for all high-value money transfer requests.
  • Updating incident response plans to reduce the impact of successful pretexting attacks.

See also: HIPAA Compliant Email: The Definitive Guide (2026 Update)

 

FAQS

How can employees tell if a request is a pretexting attempt?

Warning signs include:

  • Unusual urgency
  • Requests to bypass normal procedures
  • Pressure to keep the request confidential
  • Slight inconsistencies in email addresses or phone numbers
  • Requests for sensitive information that should never be shared

 

Why do attackers research their targets before pretexting?

Research helps attackers create more believable and personalized stories. Publicly available information can make the pretext more convincing and harder to detect

Subscribe to Paubox Weekly

Every Friday we bring you the most important news from Paubox. Our aim is to make you smarter, faster.