Spoofing | What is a Spoofing Attack? | Malwarebytes (2024)

What is spoofing? Spoofing definition

Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware. Spoofing attacks come in many forms, including:

  • Email spoofing
  • Website and/or URL spoofing
  • Caller ID spoofing
  • Text message spoofing
  • GPS spoofing
  • Man-in-the-middle attacks
  • Extension spoofing
  • IP spoofing
  • Facial spoofing

So how do the cybercriminals fool us? Often times, merely invoking the name of a big, trusted organization is enough to get us to give up information or take some kind of action. For example, a spoofed email from PayPal or Amazon might inquire about purchases you never made. Concerned about your account, you might be motivated to click the included link.

From that malicious link, scammers will send you to a web page with amalware download or a faked login page—complete with a familiar logo and spoofed URL—for the purpose of harvesting your username and password.

There are many more ways a spoofing attack can play out. In all of them, fraudsters rely on victims falling for the fake. If you never doubt the legitimacy of a website and never suspect an email of being faked, thenyou couldbecome a victim of a spoofing attack at some point.

To that end, thispage is all about spoofing. We’ll educate you on the types of spoofs, how spoofing works, how to discern legitimate emails and websites from fake ones, and how to avoid becoming a target for fraudsters.

“Spoofing, as it pertains to cybersecurity, is when someone or something pretends to be something else in an attempt to gain our confidence, get access to our systems, steal data, steal money, or spread malware.”

Types of spoofing

Email spoofing

Email spoofingis the act of sending emails with false sender addresses, usually as part of a phishing attack designed to steal your information, infect your computer with malware or just ask for money. Typical payloads for malicious emails include ransomware, adware, cryptojackers, Trojans (like Emotet), or malware that enslaves your computer in a botnet (see DDoS).

But a spoofed email address isn’t always enough to fool the average person. Imagine getting a phishing email with what looks like a Facebook address in the sender field, but the body of the email is written in basic text, no design or HTML to speak of—not even a logo. That’s not something we’re accustomed to receiving from Facebook, and it should raise some red flags. Accordingly, phishing emails will typically include a combination of deceptive features:

  • False sender address designed to look like it’s from someone you know and trust—possibly a friend, coworker, family member, or company you do business with.
  • In the case of a company or organization, the email may include familiar branding; e.g. logo, colors, font, call to action button, etc.
  • Spear phishing attacks target an individual or small group within a company and will include personalized language and address the recipient by name.
  • Typos—lots of them. Try as they might to fool us, email scammers often don’t spend much time proofreading their own work. Email spoofs often have typos, or they look like someone translated the text through Google Translate. Be wary of unusual sentence constructions; companies like Facebook or PayPal are unlikely to make such errors in their emails to customers.

Email spoofing plays a critical role in sextortion scams. These scams trick us into thinking our webcams have been hijacked with spyware and used to record us watching p*rn. These spoofed emails will say something like “I’ve been watching you watch p*rn,” which is an incredibly weird thing to say. Who’s the real creep in this scenario?

The scammers then demand some amount of Bitcoin or other cryptocurrency or else they will send the video to all your contacts. To create the impression of legitimacy the emails may also include an outdated password from some previous data breach. The spoof comes into play when the scammers disguise the email sender field to look as if it’s being sent from your supposedly breached email account. Rest assured, chances are no one is actually watching you.

Website spoofing

Website spoofing is all about making a malicious website look like a legitimate one. The spoofed site will look like the login page for a website you frequent—down to the branding, user interface, and even a spoofed domain name that looks the same at first glance. Cybercriminals use spoofed websites to capture your username and password (aka login spoofing) or drop malware onto your computer (a drive-by download). A spoofed website will generally be used in conjunction with an email spoof, in which the email will link to the website.

It’s also worth noting that a spoofed website isn’t the same as a hacked website. In the case of a website hacking, the real website has been compromised and taken over by cybercriminals—no spoofing or faking involved. Likewise, malvertising is its own brand of malware. In this case, cybercriminals have taken advantage of legitimate advertising channels to display malicious ads on trusted websites. These ads secretly load malware onto the victim’s computer.

Caller ID spoofing

Caller ID spoofing happens when scammers fool your caller ID by making the call appear to be coming from somewhere it isn’t. Scammers have learned that you’re more likely to answer the phone if the caller ID shows an area code the same or near your own. In some cases, scammers will even spoof the first few digits of your phone number in addition to the area code to create the impression that the call is originating from your neighborhood (aka neighbor spoofing).

Text message spoofing

Text message spoofing or SMS spoofing is sending a text message with someone else’s phone number or sender ID. If you’ve ever sent a text message from your laptop, you’ve spoofed your own phone number in order to send the text, because the text did not actually originate from your phone.

Companies frequently spoof their own numbers, for the purposes of marketing and convenience to the consumer, by replacing the long number with a short and easy to remember alphanumeric sender ID. Scammers do the same thing—hide their true identity behind an alphanumeric sender ID, often posing as a legitimate company or organization. The spoofed texts will often include links to SMS phishing sites (smishing) or malware downloads.

Text message scammerscan take advantage of the job market by posing as staffing agencies, sending victims to-good-to-be-true job offers. In one example, a work from home position at Amazon included a “Brand new Toyota Corrola.” First of all, why does one need a company car if they’re working from home? Second, is a Toyota “Corrola” a generic version of the Toyota Corolla? Nice try, scammers.

GPS spoofing

GPS spoofing occurs when you trick your device’s GPS into thinking you’re in one location, when you’re actually in another location. Why on Earth would anyone want to GPS spoof? Two words: Pokémon GO.

Using GPS spoofing, Pokémon GO cheaters are able to make the popular mobile game think they’re in proximity to an in-game gym and take over that gym (winning in-game currency). In fact, the cheaters are actually in a completely different location—or country. Similarly, videos can be found on YouTube showing Pokémon GO players catching various Pokémon without ever leaving their house. While GPS spoofing may seem like child’s play, it’s not difficult to imagine that threat actors could use the trick for more nefarious acts than gaining mobile game currency.

Man-in-the-Middle (MitM) attack

Man-in-the-Middle (MitM) attacks can happen when you use free Wi-Fi at your local coffee shop. Have you considered what would happen if a cybercriminal hacked the Wi-Fi or created another fraudulent Wi-Fi network in the same location? In either case, you have a perfect setup for a man-in-the-middle attack, so named because cybercriminals are able to intercept web traffic between two parties. The spoof comes into play when the criminals alter the communication between the parties to reroute funds or solicit sensitive personal information like credit card numbers or logins.

Side note: While MitM attacks usually intercept data in the Wi-Fi network, another form of MitM attack intercepts the data in the browser. This is called a man in the browser (MitB) attack.

Extension spoofing

Extension spoofing occurs when cybercriminals need to disguise executable malware files. One common extension spoofing trick criminals like to use is to name the file something along the lines of “filename.txt.exe.” The criminals know file extensions are hidden by default in Windows so to the average Windows user this executable file will appear as “filename.txt.”

IP spoofing

IP spoofing is used when someone wants to hide or disguise the location from which they’re sending or requesting data online. As it applies to cyberthreats, IP address spoofing is used in distributed denial of service(DDoS) attacks to prevent malicious traffic from being filtered out and to hide the attacker’s location.

Facial spoofing

Facial spoofing might be the most personal, because of the implications it carries for the future of technology and our personal lives. As it stands, facial ID technology is fairly limited. We use our faces to unlock our mobile devices and laptops, and not much else. Soon enough though, we might find ourselves making payments and signing documents with our faces. Imagine the ramifications when you can open up a line of credit with your face. Scary stuff.

Researchers have demonstrated how 3D facial models built from your pictures on social media can already be used to hack into a device locked via facial ID. Taking things a step further, Malwarebytes Labs reported on deepfake technology being used to create fake news videos and fake sex tapes, featuring the voices and likenesses of politicians and celebrities, respectively.

How does spoofing work?

We’ve explored the various forms of spoofing and glossed over the mechanics of each. In the case of email spoofing, however, there’s a bit more worth going over. There are a few ways cybercriminals are able to hide their true identity in an email spoof. The most foolproof option is to hack an unsecure mail server. In this case the email is, from a technical standpoint, coming from the purported sender.

The low-tech option is to simply put whatever address in the “From” field. The only problem is if the victim replies or the email cannot be sent for some reason, the response will go to whoever is listed in the “From” field—not the attacker. This technique is commonly used by spammers to use legitimate emails to get past spam filters. If you’ve ever received responses to emails you’ve never sent this is one possible reason why, other than your email account being hacked. This is called backscatter or collateral spam.

Another common way attackers spoof emails is by registering a domain name similar to the one they’re trying to spoof in what’s called a hom*ograph attack or visual spoofing. For example, “rna1warebytes.com”. Note the use of the number “1” instead of the letter “l”. Also note the use of the letters “r” and “n” used to fake the letter “m”. This has the added benefit of giving the attacker a domain they can use for a creating a spoofed website.

Whatever the spoof may be, it’s not always enough to just throw a fake website or email out into the world and hope for the best. Successful spoofing requires a combination of the spoof itself and social engineering. Social engineering refers to the methods cybercriminals use to trick us into giving up personal information, clicking a malicious link, or opening a malware-laden attachment.

There are many plays in the social engineering playbook. Cybercriminals are counting on the vulnerabilities we all carry as human beings, such as fear, naiveté, greed, and vanity, to convince us to do something we really shouldn’t be doing. In the case of a sextortion scam, for instance, you might send the scammer Bitcoin because you fear your proverbial dirty laundry being aired out for everyone to see.

Human vulnerabilities aren’t always bad either. Curiosity and empathy are generally good qualities to have, but criminals love to target people who exhibit them.

Case in point, the stranded grandchildren scam, in which a loved one is allegedly in jail or in the hospital in a foreign country and needs money fast. An email or text might read, “Grandpa Joe, I’ve been arrested for smuggling drugs in [insert name of country]. Please send funds, oh and btw, don’t tell mom and dad. You’re the best [three happy face winking emojis]!” Here the scammers are counting on the grandparent’s general lack of knowledge about where his grandson is at any given time.

“Successful spoofing requires a combination of the spoof itself and social engineering. Social engineering refers to the methods cybercriminals use to trick us into giving up personal information, clicking a malicious link, or opening a malware-laden attachment.”

How do I detect spoofing?

Here are the signs you’re being spoofed. If you see these indicators, hit delete, click the back button, close out your browser, do not pass go.

Website spoofing

  • No lock symbol or green bar. All secure, reputable websites need to have an SSL certificate, which means a third-party certification authority has verified that the web address actually belongs to the organization being verified. One thing to keep in mind, SSL certificates are now free and easy to obtain. While a site may have a padlock, that doesn’t mean it’s the real deal. Just remember, nothing is 100 percent safe on the Internet.
  • The website is not using file encryption. HTTP, or Hypertext Transfer Protocol, is as old as the Internet and it refers to the rules used when sharing files across the web. Legitimate websites will almost always use HTTPS, the encrypted version of HTTP, when transferring data back and forth. If you’re on a login page and you see “http” as opposed to “https” in your browser’s address bar, you should be suspicious.
  • Use a password manager. A password manager like 1Password will autofill your login credentials for any legitimate website you save in your password vault. However, if you navigate to a spoofed website your password manager will not recognize the site and not fill in the username and password fields for you—a good sign you’re being spoofed.

Email spoofing

  • Doublecheck the sender’s address. As mentioned, scammers will register fake domains that look very similar to legitimate ones.
  • Google the contents of the email. A quick search might be able to show you if a known phishing email is making its way around the web.
  • Embedded links have unusual URLs. Check URLs before clicking by hovering over them with your cursor.
  • Typos, bad grammar, and unusual syntax. Scammers often don’t proofread their work.
  • The contents of the email are too good to be true.
  • There are attachments. Be wary of attachments—particularly when coming from an unknown sender.

Caller ID spoofing

  • Caller ID is easily spoofed. It’s a sad state of affairs when our landlines have become a hotbed of scam calls. It’s especially troubling when you consider that the majority of people who still have landlines are the elderly—the group most susceptible to scam calls. Let calls to the landline from unknown callers go to voicemail or the answering machine.

How can I protect against spoofing?

First and foremost, you should learn how to spot a spoofing attack. In case you skipped over the “How do I detect spoofing?” section you should go back and read it now.

Turn on your spam filter. This will stop the majority of spoofed emails from ever making it to your inbox.

Don’t click on links or open attachments in emails if the email is coming from an unknown sender. If there’s a chance the email is legitimate, contact the sender through some other channel and confirm the contents of the email.

Log in through a separate tab or window. If you get a suspicious email or text message, requesting that you log in to your account and take some kind of action, e.g., verify your information, don’t click the provided link. Instead, open another tab or window and navigate to the site directly. Alternatively, log in through the dedicated app on your phone or tablet.

Pick up the phone. If you’ve received a suspicious email, supposedly from someone you know, don’t be afraid to call or text the sender and confirm that they, indeed, sent the email. This advice is especially true if the sender makes an out-of-character request like, “Hey, will you please buy 100 iTunes gift cards and email me the card numbers? Thanks, Your Boss.”

Show file extensions in Windows. Windows does not show file extensions by default, but you can change that setting by clicking the “View” tab in File Explorer, then checking the box to show file extensions. While this won’t stop cybercriminals from spoofing file extensions, at least you’ll be able to see the spoofed extensions and avoid opening those malicious files.

Invest in a goodantivirus program. In the event that you click on a bad link or attachment, don’t worry, a good antivirus program will be able to alert you to the threat, stop the download and prevent malware from getting a foothold on your system or network. Malwarebytes, for example, hasantivirus/anti-malware products that you can try free before subscribing.

News on spoofing

  • Scammers are spoofing bank phone numbers to rob victims
  • Phishers spoof reliable cybersecurity training company to garner clicks
  • Spoofed addresses and anonymous sending: new Gmail bugs make for easy pickings
  • When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained
  • Lesser known tricks of spoofing extensions

For more reading about spoofing and all the latest news on cyberthreats, visit theMalwarebytes Labs blog.

History of spoofing

There’s nothing new about spoofing. In fact, the word “spoof” as a form of trickery goes back over a century. According to the Merriam-Webster online dictionary, the word “spoof” is attributed to 19th century English comedian Arthur Roberts in reference to a game of trickery and deception of Robert’s creation. The rules of the game have been lost to time. We can only guess the game wasn’t very fun or the Brits of the time didn’t like being goofed on. Whatever the case may be, the name stuck though the game didn’t.

It wasn’t until the early 20th century, spoof became synonymous with parody. For several decades whenever someone mentioned “spoof” or “spoofing” it was in reference to something funny and positive—like the latest film spoof from Mel Brooks or comedy album from “Weird Al” Yankovic.

Today, spoofing is most often used when talking about cybercrime. Whenever a scammer or cyberthreat pretends to be someone or something they’re not, it’s spoofing.

Spoofing | What is a Spoofing Attack? | Malwarebytes (2024)

FAQs

Spoofing | What is a Spoofing Attack? | Malwarebytes? ›

Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.

What is a spoofing attack? ›

A spoofing attack is an active attack that may be perpetrated by an internal or external attacker, in which an attacker masquerades as another one in order to gain an illegitimate advantage.

How is spoofing defined? ›

Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, and websites, or can be more technical, such as a computer spoofing an IP address, Address Resolution Protocol (ARP), or Domain Name System (DNS) server.

What type of attack relies on spoofing? ›

While spoofing and phishing are different types of cyber attacks, phishing often relies on spoofing to succeed.

What is an example of spoofing? ›

Fake job offers, fake banking-related messages, fake lottery messages, money refund scams, and password reset messages are some examples of Text Message Spoofing. Spoofed messages are difficult to identify until the person is aware of where to look for them. The sender's name cannot be clicked and replied.

Is spoofing attack active or passive? ›

A masquerade attack, also known as impersonation or spoofing, is an active attack where an unauthorized entity assumes the identity of a legitimate user or system to gain unauthorized access or deceive others.

What is spoofing and why is it illegal? ›

Spoofing is often used as part of an attempt to trick someone into giving away valuable personal information so it can be used in fraudulent activity or sold illegally, but also can be used legitimately, for example, to display the toll-free number for a business.

How is spoofing illegal? ›

When is spoofing illegal? Under the Truth in Caller ID Act, FCC rules prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value. Anyone who is illegally spoofing can face penalties of up to $10,000 for each violation.

Why do people spoof? ›

Spoofing criminals try to gain your trust, and they count on making you believe that the spoofed communications are legitimate. Often, using the name of a big, trusted company—such as Amazon or PayPal—is enough to get targets to take some kind of action or reveal information.

How are people spoofing? ›

Voice over IP

More recently, open-source software has made it possible for almost anyone to spoof calls with little cost or technical knowledge. One of the most prevalent ways of spoofing is through VoIP. VoIP stands for Voice over Internet Protocol and is basically a phone service delivered via the Internet.

What is the most common spoofing? ›

E-mail spoofing

Email spoofing is the most common of all the modalities found on the network today. This technique has similar traits to phishing as it is a technique through which the spoofer sends emails to many email addresses impersonating real identities, using official logos and headers.

What are the risks of spoofing attacks? ›

The consequences of spoofing can be severe, ranging from data breaches and financial loss to reputational damage and operational disruption. Preventing spoofing requires a combination of user awareness, robust security protocols, up-to-date technology, and organizational policies.

Is spoofing an attack vector? ›

This module of the SET allows an attacker to create a spoofed SMS and send it to a target. The main aim of the SMS is to convince a target to follow a certain link but when they do so, it leads them to a malicious site and the credentials stored in their browser are stolen.

How do you know if someone is spoofing? ›

If someone calls you and tells you that you called them but didn't, your number was likely being spoofed. The FCC advises to inform the person who received a spoofed call from your number that it wasn't you.

What happens when you are spoofed? ›

Spoofing is a broad term for the type of behavior that involves a cybercriminal masquerading as a trusted entity or device to get you to do something beneficial to the hacker — and detrimental to you. Any time an online scammer disguises their identity as something else, it's spoofing.

What is the punishment for spoofing? ›

Traders typically spoof to misrepresent supply or demand in order to induce other traders to act in a way beneficial to the spoofer. Spoofing is a federal crime punishable by up to 10 years' imprisonment per violation. What types of misconduct should you be on the lookout for?

What happens if you get spoofed? ›

Phone number spoofing causes the Caller ID to display a phone number or other information to make it look like the calls are from a different person or business. While the caller's information may appear local, the calls are often placed by telemarketers located outside the state or country.

How illegal is spoofing? ›

When is spoofing illegal? Under the Truth in Caller ID Act, FCC rules prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value. Anyone who is illegally spoofing can face penalties of up to $10,000 for each violation.

What is the most common type of spoofing? ›

Email spoofing is the most common of all the modalities found on the network today. This technique has similar traits to phishing as it is a technique through which the spoofer sends emails to many email addresses impersonating real identities, using official logos and headers.

What is the difference between phishing and spoofing? ›

The main difference between Spoofing and Phishing is that in Spoofing, a hacker tries to grab the original identity of a genuine user, while in Phishing, hackers design a plot to reveal some sensitive data of the user.

Top Articles
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 5656

Rating: 4.7 / 5 (47 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.