{"id":27284,"date":"2024-04-10T13:18:33","date_gmt":"2024-04-10T21:18:33","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=27284"},"modified":"2024-03-27T13:20:01","modified_gmt":"2024-03-27T21:20:01","slug":"what-is-pretexting","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/","title":{"rendered":"What Is Pretexting? How Scammers Persuade You To Help Them Attack"},"content":{"rendered":"\n<p>It\u2019s a well-established fact of human nature that we love stories.&nbsp; From fairy tales to blockbuster movies and Super Bowl commercials, narratives provide us with the framework we use to make sense of the world, learn what constitutes proper behavior, and \u2014 as for those commercials \u2014 even buy beer.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, scammers have a somewhat specialized take on human nature, and to them our love of narrative is a weakness to be exploited.&nbsp; That\u2019s how \u201cpretexting\u201d attacks work, and they\u2019re a widespread component of the identity theft ecosystem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Pretexting?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.csoonline.com\/article\/3546299\/what-is-pretexting-definition-examples-and-prevention.html\" target=\"_blank\" rel=\"noreferrer noopener\">Pretexting is a form of social engineering<\/a>, which is to say it relies on psychology.\u00a0 If a stranger walked up to you and asked you to divulge sensitive personal information, or transfer money to a given destination, you\u2019d rightly refuse or at the very least ask a <em>lot<\/em> of questions.\u00a0<\/p>\n\n\n\n<p>That changes if there\u2019s a plausible pretext for the request (hence the term <em>pretexting<\/em>), and if you believe the person making the request has some reasonable grounds for doing so.&nbsp; Typically in these attacks the scammer will impersonate your boss, or the IT department, or your bank, or some other authority figure, which is why it\u2019s more advanced than mere phishing. For pretexting to work, the scammers need to know something about you.<\/p>\n\n\n\n<p>Most of us have had a parent, teacher, boss, or some other figure in our lives whose attitude was:\u00a0 \u201cWhen I say, \u2018Jump,\u2019 you say, \u2018How high?\u2019\u201d\u00a0 Obedience was expected or demanded, and questions weren\u2019t well received.\u00a0 As a result we\u2019re predisposed to respond to this kind of approach.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Differentiates Pretexting<\/h2>\n\n\n\n<p>A pretexting attack is more sophisticated than many scams and requires a higher level of skill and research from the criminals.&nbsp; Let\u2019s use a concrete example to illustrate.&nbsp;<\/p>\n\n\n\n<p>Suppose you receive an email or text message that says, \u201cYour device is infected with malware!&nbsp; Click here to remove it!\u201d&nbsp; This is a straightforward phishing scam, even if the scammers appropriate the logo of a legitimate tech company or a not-quite-correct version of a legitimate URL.&nbsp;<\/p>\n\n\n\n<p>Now consider a message that appears to come from one of your employer\u2019s in-house email accounts, and says, \u201cHi, [your name], it\u2019s Grant from the IT department.\u00a0 Intel just released a patch for vulnerability #<a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00528.html\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-0146<\/a>, so I\u2019ll need to log in to your machine remotely for about 10 minutes to apply the UEFI BIOS update.\u201d\u00a0<\/p>\n\n\n\n<p>That\u2019s a believable pretext in many companies, which illustrates exactly why pretexting is so dangerous:&nbsp; It frames a risky behavior (sending money or clicking a link, allowing an outsider access to your computer) as something familiar, routine and expected.&nbsp; Something \u2014 in short \u2014 we\u2019re likely to do without really thinking about it.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Some Real-World Examples of Pretexting<\/h2>\n\n\n\n<p>As an individual, scammers may have stolen or purchased some of your information, and used that to work up a persuasive script in an effort at stealing the rest of your identity.&nbsp;<\/p>\n\n\n\n<p>For businesses, criminals may follow up an initial attack \u2014 an <a href=\"https:\/\/www.zdnet.com\/article\/everything-you-need-to-know-about-microsoft-exchange-server-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">email server hack<\/a>, perhaps, or successfully <a href=\"https:\/\/blog.knowbe4.com\/bid\/252414\/top-5-spear-phishing-attacks-targeting-executives\" target=\"_blank\" rel=\"noreferrer noopener\">spear phishing an executive<\/a> \u2014 by using the information they\u2019ve gained to create and target a pretexting attack.\u00a0 In our previous example, scammers would match the email\u2019s style and language to those of the targeted company.\u00a0 If the company\u2019s culture was authoritarian, the email might be more peremptory:\u00a0 \u201cI\u2019ll be performing the update at 2:15.\u00a0 Please save your work and log out of all programs except your web browser.\u201d\u00a0\u00a0<\/p>\n\n\n\n<p>There are plenty of specific examples of real-world pretexting attacks out there, if you do a bit of Googling.&nbsp; Some of them include:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u201cSIM Swapping\u201d Attacks&nbsp;<\/h3>\n\n\n\n<p>The scammer has your phone number and knows enough about you to <a href=\"https:\/\/blog.mozilla.org\/en\/internet-culture\/mozilla-explains\/mozilla-explains-sim-swapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">impersonate you in a call to your cellular carrier<\/a>.\u00a0 The pretext is that your phone has been lost or damaged and that \u201cyou\u201d need to have service switched to your new phone and SIM card.\u00a0<\/p>\n\n\n\n<p>If the service rep at your carrier obliges, scammers will now have control of your phone number and \u2014 depending what other information they have \u2014 can use it to log in to your accounts, receive verification texts and even lock you out of your own banking app.\u00a0 Twitter CEO Jack Dorsey famously <a href=\"https:\/\/www.wired.com\/story\/jack-dorsey-twitter-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">fell victim to a SIM swap<\/a> in 2019.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Bank (or Credit Card, or PayPal) Impersonation&nbsp;<\/h3>\n\n\n\n<p>The scammer has part of your financial information, and the pretext is that they\u2019re the customer service rep helping you fix \u201c&#8230;a problem with your account ending in the digits 3058\u2026\u201d&nbsp; You may be prompted to click a link to change your password \u2014 which of course gives them your current one \u2014 or the \u201crep\u201d will helpfully take your current PIN or password over the phone in order to change it for you.&nbsp; The approach might be by phone, email or text message.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vendor Impersonation&nbsp;<\/h3>\n\n\n\n<p>In this one, the pretext is that the scammer is a <a href=\"https:\/\/www2.cso.com.au\/article\/648201\/how-defraud-company-just-ask\/\" target=\"_blank\" rel=\"noreferrer noopener\">senior person at a vendor<\/a> your company does business with regularly.\u00a0 The scammer sends an email to your accounts payable department, spoofed to look like it comes from the vendor\u2019s actual email address, explaining that they\u2019ve changed banks and could you please update their payment information?\u00a0 If you do, legitimate payments meant for that vendor go to the scammer instead.\u00a0 Depending on the scale of your respective companies, losses can be very large.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Executive Impersonation<\/h3>\n\n\n\n<p>The pretext is that the scammer is your CEO or another senior executive, and \u2014 since they\u2019re tied up in one way or another and can\u2019t attend to it \u2014 you\u2019re tasked with transferring a sum of money, or sensitive information about your company or its customers, to a bank, potential investor or other plausible destination.\u00a0 Cases like this are seldom publicized (it\u2019s a bad look for the victims), but one manufacturer of networking hardware <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/what-is-pretexting-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">lost over $40 million<\/a> to this kind of scam a few years ago.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The \u201cGrandkid in Trouble\u201d Scam<\/h3>\n\n\n\n<p>The caller (or sender, in the case of messages) claims to be one of your grandkids, or some other member of your extended family:&nbsp; someone you feel obligated to help, but whose voice you wouldn\u2019t necessarily recognize.&nbsp;<\/p>\n\n\n\n<p>The pretext is that they have a problem:&nbsp; an accident or emergency car repair, or maybe they\u2019re down in Mexico and their credit card\u2019s been locked because they forgot to tell the bank they\u2019re traveling.&nbsp; So you wire them some money, which you never see again.&nbsp; The information to pull this off can often be gleaned from social media.&nbsp;<\/p>\n\n\n\n<p>Overall, pretexting is an integral part of the fraud\/identity theft cycle. It\u2019s part of many phishing attacks, and it\u2019s a prerequisite for spear phishing (targeted phishing attacks against specific people or organizations, as opposed to random \u201ctry everyone\u201d phishing).&nbsp; Every time scammers gain a useful piece of information it helps them create better pretexts, which makes it easier for them to steal your money or gain more and better information, which in turn enables better pretexting.&nbsp; It\u2019s great for them, but not so much for the rest of us.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Spotting a Pretexting Attack<\/h2>\n\n\n\n<p>So how can you differentiate between a pretexting attack and a legitimate request?&nbsp; There are a few important tests you can apply:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Familiarize yourself with your bank\/credit card provider\/utility company\u2019s policies.&nbsp; If you get a text or email purporting to come from them, but you know that\u2019s not how they resolve account issues, it\u2019s easy to dismiss.&nbsp;<\/li>\n\n\n\n<li>Ask yourself:&nbsp; \u201cIs this what I\u2019d say\/how I\u2019d act if I was a scammer?\u201d&nbsp; If the answer is yes, then you should at least question the legitimacy of the contact no matter how plausible it sounds.<\/li>\n\n\n\n<li>Look for the telltale note of urgency.&nbsp; Scammers will always push you to ACT RIGHT NOW, before you have time to think about it.&nbsp;<\/li>\n\n\n\n<li>Take time to regularly read about the latest scams on sites like the FTC\u2019s <a href=\"https:\/\/www.consumer.ftc.gov\/features\/scam-alerts?page=1\" target=\"_blank\" rel=\"noreferrer noopener\">Scam Alerts page<\/a> and the BBB\u2019s <a href=\"https:\/\/www.bbb.org\/us\/news\/scams\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cLatest News\u201d page<\/a> or its online <a href=\"https:\/\/www.bbb.org\/scamtracker\/\" target=\"_blank\" rel=\"noreferrer noopener\">Scam Tracker<\/a>.\u00a0 Even the best pretext can lose its effectiveness if you know it\u2019s actively being used by scammers.\u00a0<\/li>\n\n\n\n<li>In a workplace context, ask yourself if you\u2019re being asked to do something that falls outside of normal procedures or bypasses a standing security measure.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>If you believe you\u2019ve been approached with a pretexting attack, in either the personal or business context, there are steps you can take to verify the legitimacy of the request.&nbsp; Because prevention is better than reaction, you should also take measures to prevent or thwart pretexting attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preventing a Pretexting Attack (or Preventing It From Succeeding)<\/h2>\n\n\n\n<p>What can you do about a pretexting attack and how can you prevent them in the first place?&nbsp;<\/p>\n\n\n\n<p>To manage attacks targeting you personally:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Respond to dubious phone calls with \u201cI\u2019ll call you right back,\u201d and then reach out directly to the bank\/creditor\/government agency through their published phone number.\u00a0 Treat emails or messages the same way, reaching out to the purported sender as opposed to answering the message or (especially) clicking the internal link or dialing the phone number you\u2019ve been sent.<\/li>\n\n\n\n<li>Learn how to <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-email-spoofing-learn-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noreferrer noopener\">uncover a spoofed email<\/a> and test any incoming message that could conceivably be a pretexting attack.\u00a0 It only takes a moment or two and can save you a <em>lot<\/em> of grief.\u00a0<\/li>\n\n\n\n<li>Actively manage your <a href=\"https:\/\/www.spokeo.com\/compass\/is-your-online-identity-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">online identity<\/a>, aka your \u201c<a href=\"https:\/\/www.spokeo.com\/compass\/how-to-protect-your-digital-footprint\/\" target=\"_blank\" rel=\"noreferrer noopener\">digital footprint<\/a>.\u201d\u00a0 The less information you leave lying around, the fewer opportunities scammers have to misuse it.\u00a0<\/li>\n\n\n\n<li>Know how much of your personal information is already public.\u00a0 Searching yourself using Spokeo\u2019s <a href=\"https:\/\/www.spokeo.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">people search tools<\/a> is a really valuable starting point.\u00a0<\/li>\n\n\n\n<li>Check your email, phone number and passwords regularly against a database of known breaches, like the one at <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Have I Been Pwned?<\/a>\u00a0 If your information has been compromised, or if a site you deal with shows up on its list of breaches, you\u2019ll know you\u2019re especially vulnerable to pretexting attacks.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Subscribe to <a href=\"https:\/\/www.spokeo.com\/identity-theft-protection\" target=\"_blank\" rel=\"noreferrer noopener\">Spokeo Protect<\/a>, our identity protection service, which can alert you if crucial pieces of information such as your SSN and banking or credit card information are offered up for sale on the <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-find-out-if-your-information-is-on-the-dark-web-and-what-to-do\/\" target=\"_blank\" rel=\"noreferrer noopener\">dark web<\/a>.\u00a0 If that\u2019s the case, any caller using the same info to establish their legitimacy automatically becomes suspect.<\/p>\n\n\n\n<p>Some of the same principles are fully transferable to businesses, such as teaching everyone how to check for spoofed emails.&nbsp; Other useful measures include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Signing up for an email security service, which can provide anti-phishing and anti-spoofing tools to complement those that come standard from your provider.&nbsp;<\/li>\n\n\n\n<li>Training all staff to recognize pretexting when they see it, whether it happens by phone, email or even in person (yes, criminals sometimes physically enter a workplace in order to compromise it).&nbsp; This includes executives at the C-suite level, who are the highest-value targets for scammers and have an unfortunate tendency to be impatient with security measures.&nbsp;<\/li>\n\n\n\n<li>Establishing policies that take common pretexting attacks into account and make them unworkable.&nbsp; For example, the vendor attack cited above could be prevented if your policy is to verify all such changes directly with the vendor\u2019s accounts payable department.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Fraud Never Sleeps, but You Can<\/h2>\n\n\n\n<p>It\u2019s an unfortunate fact of our modern, connected world that crime rings operate 24\/7.&nbsp; That doesn\u2019t mean you yourself have to lose any sleep, if you\u2019re appropriately informed or prepared.&nbsp;<\/p>\n\n\n\n<p>Pretexting isn\u2019t like data breaches and hacks, which you can\u2019t control:\u00a0 Those will happen, and there\u2019s little if anything you can do about it.\u00a0 For pretexting to work, you have to \u201cbuy\u201d the story the scammer is selling.\u00a0 You can sleep well knowing that if you\u2019re prepared and skeptical, even the best-thought-out pretext won\u2019t trick you into compliance.\u00a0<\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p>CSO Online &#8211; <a href=\"https:\/\/www.csoonline.com\/article\/3546299\/what-is-pretexting-definition-examples-and-prevention.html\" target=\"_blank\" rel=\"noreferrer noopener\">What Is Pretexting?\u00a0 Definition, Examples and Prevention<\/a><\/p>\n\n\n\n<p>Intel &#8211; <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00528.html\" target=\"_blank\" rel=\"noreferrer noopener\">Intel Processor Advisory SA-00528<\/a><\/p>\n\n\n\n<p>ZDNet &#8211; <a href=\"https:\/\/www.zdnet.com\/article\/everything-you-need-to-know-about-microsoft-exchange-server-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Everything You Need To Know About the Microsoft Exchange Server Hack<\/a><\/p>\n\n\n\n<p>KnowBe4 &#8211; <a href=\"https:\/\/blog.knowbe4.com\/bid\/252414\/top-5-spear-phishing-attacks-targeting-executives\" target=\"_blank\" rel=\"noreferrer noopener\">Top 5 Spear-Phishing Attacks Targeting Executives<\/a><\/p>\n\n\n\n<p>Mozilla Blog &#8211; <a href=\"https:\/\/blog.mozilla.org\/en\/internet-culture\/mozilla-explains\/mozilla-explains-sim-swapping\/\" target=\"_blank\" rel=\"noreferrer noopener\">Mozilla Explains:\u00a0 SIM Swapping<\/a><\/p>\n\n\n\n<p>Wired &#8211; <a href=\"https:\/\/www.wired.com\/story\/jack-dorsey-twitter-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">How Twitter CEO Jack Dorsey\u2019s Account Was Hacked<\/a><\/p>\n\n\n\n<p>CSO Online (Australia) &#8211; <a href=\"https:\/\/www2.cso.com.au\/article\/648201\/how-defraud-company-just-ask\/\" target=\"_blank\" rel=\"noreferrer noopener\">How To Defraud a Company?\u00a0 Just Ask.<\/a>\u00a0<\/p>\n\n\n\n<p>Comparitech &#8211; <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/what-is-pretexting-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">What Is a Pretexting Attack (With Examples)?<\/a><\/p>\n\n\n\n<p>U.S. Federal Trade Commission &#8211; <a href=\"https:\/\/www.consumer.ftc.gov\/features\/scam-alerts?page=1\" target=\"_blank\" rel=\"noreferrer noopener\">Most Recent Scam Alerts<\/a><\/p>\n\n\n\n<p>Better Business Bureau &#8211; <a href=\"https:\/\/www.bbb.org\/us\/news\/scams\" target=\"_blank\" rel=\"noreferrer noopener\">Latest News:\u00a0 Scams<\/a><\/p>\n\n\n\n<p>Have I Been Pwned? &#8211; <a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Check if Your Email or Phone Is in a Data Breach<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.<\/p>\n","protected":false},"author":112,"featured_media":27285,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-27284","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Pretexting? How to Avoid This Scammer Attack | Spokeo<\/title>\n<meta name=\"description\" content=\"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Pretexting? How to Avoid This Scammer Attack | Spokeo\" \/>\n<meta property=\"og:description\" content=\"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T21:18:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1155\" \/>\n\t<meta property=\"og:image:height\" content=\"770\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/\",\"name\":\"What Is Pretexting? How to Avoid This Scammer Attack | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1\",\"datePublished\":\"2024-04-10T21:18:33+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1\",\"width\":1155,\"height\":770,\"caption\":\"acquaintance using pretext to get information\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Pretexting? How to Avoid This Scammer Attack | Spokeo","description":"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/","og_locale":"en_US","og_type":"article","og_title":"What Is Pretexting? How to Avoid This Scammer Attack | Spokeo","og_description":"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.","og_url":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2024-04-10T21:18:33+00:00","og_image":[{"width":1155,"height":770,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/","url":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/","name":"What Is Pretexting? How to Avoid This Scammer Attack | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1","datePublished":"2024-04-10T21:18:33+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"What is pretexting? Learn how scammers use it to get your money or information, and what you can do to protect yourself against this kind of attack.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/what-is-pretexting\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1","width":1155,"height":770,"caption":"acquaintance using pretext to get information"},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/priscilla-du-preez-K8XYGbw4Ahg-unsplash-scaled.jpg?fit=1155%2C770&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-764","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=27284"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27284\/revisions"}],"predecessor-version":[{"id":27286,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27284\/revisions\/27286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/27285"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=27284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=27284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=27284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}