www.rd.com Open in urlscan Pro
2606:4700:4400::ac40:9573  Public Scan

Submitted URL: https://click.email.rd.com/?qs=1c1850b33d0b9c3525b9114b00af26b2b904c95f6e467773a32105cf363c181e6cdb313f83b6c923e643d1c5a0c7...
Effective URL: https://www.rd.com/article/spoofing/?_cmp=readuprdus&_ebid=readuprdus8182022&_mid=523412&ehid=23CBB59D03EC6926B99D3...
Submission: On August 18 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://www.rd.com/newsletter/?posturl=https://www.rd.com/article/spoofing

<form action="https://www.rd.com/newsletter/?posturl=https://www.rd.com/article/spoofing" method="post" data-name="newslettersignup" data-module="newslettersignup" data-position="footer">
  <label class="hidden" for="email-footer">Enter email address</label>
  <input type="text" id="email-footer" name="email" placeholder="Email Address" aria-label="Add email address">
  <button type="submit" id="subscribe-footer">Sign Up</button>
</form>

GET https://www.rd.com

<form class="pure-form" id="hamburger-searchform" role="search" method="get" action="https://www.rd.com">
  <div class="hamburger-search-form-wrapper">
    <label class="hidden" for="s"> Search terms </label>
    <input class="hamburger-searchbar" type="text" value="" name="s" id="s" placeholder="Search">
    <input type="submit" class="hamburger-searchsubmit search-button" aria-label="Search">
  </div>
</form>

Text Content

Share
Save Saved
Share on Facebook
Save on Pinterest
Tweet this
Email
Next
 * 
 * 
 * 
 * 
 * 

Skip to main content

A Trusted Friend in a Complicated World

Sign Up for Newsletters
Subscribe Now
Give a Gift


SUBSCRIBE & SAVE

1 Year for Only $10!

Give a gift SUBSCRIBE


RD LARGE PRINT

1 Year for Only $18!

Give a gift SUBSCRIBE

Sign Up for Newsletters

Subscribe
Subscribe

1 Year for Only $10!


RD Large Print

1 Year for Only $18!


Sign Up for Newsletters



 * The Healthy
   
 * Food
   
 * Home
   
 * Humor
   
 * Knowledge
   
 * Holidays
   
 * Subscribe
   

ADVERTISEMENT

 * 
 * 
 * 
 * 
 * 

RD.COM Money Scams


WHAT IS SPOOFING, AND HOW CAN YOU SPOT IT?


Brooke NelsonUpdated: Aug. 02, 2022
RD.com, Getty Images


SPOOFING IS A FUNNY WORD, BUT ITS CONSEQUENCES ARE SERIOUS. HERE'S HOW SPOOFING
WORKS, THE MANY FORMS IT CAN TAKE AND HOW TO PROTECT YOURSELF AGAINST IT.

 * 
 * 
 * 
 * 
 * 

Just when you think you know how to avoid security threats online,
cybercriminals keep getting savvier. Spoofing—a scam in which a criminal
pretends to be someone else so they can commit fraud, spread malware or carry
out other cyberattacks—is the latest in a long list of online scams to keep on
your radar.

Here’s the good news: Taking simple security measures, like learning about spam
texts to delete immediately, the area codes phone scam and the four-word phone
scam, can make it harder for fraudsters to fool you. To help you stay safe,
we’ve asked cybersecurity experts to explain how spoofing works and what you can
do to avoid falling victim.


WHAT IS AN EXAMPLE OF SPOOFING?

A spoofing scam might be an email, text message or phone call that appears to be
from a trusted source, like a loved one or even a popular brand. But in reality,
a fraudster is behind the fake email address or phone number, hoping to convince
you to download malicious software, send money or share personal information or
data with them.

Spoofing attacks can take many forms. In one recent example, hackers created
phony Zoom invitations for virtual meetings at community associations and school
boards. Victims who clicked on the document attached to the emails infected
their devices with malware. Other examples of spoofing include emails posing as
a request from PayPal or eBay for your login information, or text messages that
appear to be money transfers from an online wallet or bank.



RD.com

via hooksecurity.co


IS SPOOFING A CRIME?

Spoofed emails, phone calls or text messages that lead to criminal acts such as
attempted hacking, fraud or financial theft are illegal, according to Karim
Hijazi, CEO of cyber intelligence company Prevailion and a former contractor for
the U.S. intelligence community. It happens more often than you think too. In a
recent FBI report, people reported losing more than $82 million to spoofing
scams in 2021.

If you are the victim of spoofing or other online fraud, you can file a
complaint with the FBI’s Internet Crime Complaint Center (IC3), as well as your
local police station if you lost money. FYI, these Venmo scams, Amazon scams and
Facebook Marketplace scams could also steal your money.


SPOOFING BY TEXT


HOW IT WORKS

In spoofed text messages, fraudsters disguise their sender ID to appear as
someone or something they are not. They might claim to be your boss or family
member, or they might impersonate a familiar company like Amazon or your bank.
Either way, their goal is to trick you into sharing personal data or clicking a
link that infects your phone with a virus.

Unfortunately, it’s now easier than ever to create spoofed text messages. Most
criminals use a software that allows them to create any sender ID they choose.
“It used to require a business phone system to spoof caller ID, but now anyone
can download an app from the App Store enabling them to make spoofed calls or
texts,” says Aaron Higbee, co-founder and chief technology officer at
cybersecurity firm Cofense.




WHY IT’S DANGEROUS

The biggest danger of spoofing by text message: It is extremely difficult and
sometimes impossible to recognize. “Spoofed text messages can sometimes be
indistinguishable from legitimate messages, so the reader really has to pay
attention,” says Andrew Barratt, vice president of technology and enterprise at
cybersecurity firm Coalfire.

Not only are spoofing texts tough to spot, but they can also cause serious harm
to victims. For example, by clicking a link attached to the text message, you
could accidentally download malware that allows someone to spy on your iPhone.
If a fraudster can convince you that they are from your bank, you might share
financial or other sensitive information with them. Victims can also be fooled
into sending money to a criminal if they believe they are texting a loved one.


HOW TO RECOGNIZE A SPOOFING TEXT

Beware of any text message from a phone number that you don’t recognize, says
Higbee. If you receive a message that appears to be a fraud detection or billing
alert from a company you do business with, like your bank, look up the company’s
publicly listed number and call them directly to confirm the message. These
alerts are among the most popular tricks that fraudsters use today, Higbee says.
You should also learn how to stop spam texts in the first place.




SPOOFING BY PHONE CALL


HOW IT WORKS

Like spoofed text messages, spoofing by phone call relies on technology that
allows criminals to create a fake caller ID. Then they can place calls
pretending to be Amazon, PayPal, your bank or any other familiar business in
order to steal money or sensitive information.

For example, attackers may call someone to warn them about a fraud alert on
their account and then offer to help, according to Higbee. By tricking the
victim into sharing their login information, fraudsters can gain access to the
person’s account and to any sensitive data it contains, like credit card
numbers. These free password managers can help keep your log-ins secure from
hackers.


WHY IT’S DANGEROUS

People often fall victim to spoofed phone calls because mobile carriers are not
able to block these calls or alert people that the call may be a scam, according
to Hijazi. “For the recipient of the call, everything appears legitimate,” he
says. “When your bank’s name appears in your caller ID, it’s easy to be fooled.”



Hijazi also notes that criminal call centers have gotten very good at imitating
the real customer service procedures of legitimate organizations like banks,
which makes it even harder for the victim to realize they’re being conned. Stay
ahead of spoofing phone calls by learning how to stop robocalls for good.


HOW TO RECOGNIZE A SPOOFING CALL

If you receive a suspicious call, Barratt recommends paying attention to the
quality of the audio. “The perpetrator is likely to be using a low-grade
internet phone service that results in poor call quality,” he says. Always
verify that the call is legitimate by contacting the company directly before
handing over any sensitive information like your login credentials or credit
card numbers.

Urgent requests to share information, send money, click a link or download an
attachment should be viewed with suspicion, according to Hijazi. “These scammers
are very good at preying on our anxieties, and they will also try to move
quickly to prevent the person from having time to think,” he says.




SPOOFING BY EMAIL


HOW IT WORKS

Believe it or not, spoofing is one of the many things hackers can do with just
your email address. “Email historically has been very [easy] to spoof,” Barratt
says. All fraudsters need to do is create a forged sender address that looks
like yours, making small and tough-to-spot changes, like adding a period or
swapping a number with a letter. Then they use the email address to send “spoof”
messages containing harmful malware or urgent requests for money.

Keep in mind that “spoofing isn’t the same thing as hacking,” Hijazi says. “When
a person’s email is spoofed, it hasn’t actually been compromised by the hacker.
It’s just been copied.”

You could receive spoofed emails too. With email spoofing, attackers are hoping
to fool you by assuming the identity of a person or organization you know and
asking you for money, sensitive information or other favors. The sender’s title
mimics the real person’s or organization’s name, but the email address is
slightly different from their actual one.




WHY IT’S DANGEROUS

A spoofed email address looks legitimate, so email spoofing allows scammers to
bypass the spam filters on most email accounts. Once spoofed emails make it into
an inbox, victims are much more likely to open and fall for them. “People assume
that when a sender’s name appears in their inbox, it’s the real person,” Hijazi
says. “But this is very easy to fake.”

Email spoofing is the number one way people and companies get hacked, according
to Hijazi. “You can be scammed out of money or personal information, lose access
to your accounts or wind up with a malware infection on your device,” he says.
Malware attacks that rely on phishing emails, such as these Apple ID phishing
scams, are on the rise as well.

What’s more, spoofed emails might be linked to sextortion schemes, which lure
the victim into engaging in a private conversation or sending sensitive images
of themselves that are later used for blackmail. Hackers may also impersonate a
law enforcement agency and claim they have proof that you have engaged in
illegal activities, like accessing child pornography, Hijazi warns.




HOW TO RECOGNIZE A SPOOFING EMAIL

Receiving any emails from a contact through a new sender address should be a red
flag that you might be dealing with a spoofing attack. Higbee advises being
skeptical of any explanation as to why the sender is using a new email address.
“When an attacker spoofs the friendly name, they will usually have a lie to
explain why they are using a new email address,” he says. Instead, reach out to
your contact in person or by phone call to confirm that the message is real.

For spoofing emails from companies or brands, Hijazi recommends checking the
sender address to make sure it matches the sender’s name and actual email
address. He also suggests looking for grammar and spelling mistakes, as well as
any errors in the email format, which could indicate the email is not
legitimate.

Luckily, “many online mail providers are already picking up spoof emails with
the additional security they provide to help users with spam,” Barratt says.
Still, you should always stay alert for spoofing emails and other phishing
attacks in your inbox.




OTHER TYPES OF SPOOFING

There are many other types of online spoofing to watch out for, and not all of
it is related to financial fraud, experts say. For example, name spoofing—when
fraudsters spoof the names of people with large audiences online to promote
pyramid schemes or cryptocurrencies—is common on Twitter, YouTube and other
social media platforms, Higbee says.

Don’t assume screenshots of text messages are legitimate, either, Higbee says.
People can fabricate a conversation with someone by spoofing their phone number,
screenshotting it and claiming the messages are a real conversation. This can
cause personal and reputational damage for the spoofed person.

To keep your own info from falling into the wrong hands—and potentially leading
to a spoofing attack—know the security risks of using public Wi-Fi networks and
prevent companies from buying and selling your personal information.



Sources:

 * Karim Hijazi, CEO of Prevailion
 * Aaron Higbee, co-founder and chief technology officer at Cofense
 * Andrew Barratt, vice president of technology and enterprise at Coalfire
 * FBI: “Internet Crime Report 2021”
 * Avanan: “Local Meetings Under Attack”

rd.com, Getty Images (2)

HOW DOXXING SETS YOU UP TO BE HACKED

Boris Zhitkov/Getty Images

HOW TO CREATE GOOD PASSWORDS

monsitj/Getty Images

HOW TO DISAPPEAR FROM THE INTERNET




POPULAR VIDEOS

ⓘ








More From Reader's Digest


0 seconds of 2 minutes, 30 secondsVolume 0%

Press shift question mark to access a list of keyboard shortcuts
Keyboard ShortcutsEnabledDisabled
Play/PauseSPACE
Increase Volume↑
Decrease Volume↓
Seek Forward→
Seek Backward←
Captions On/Offc
Fullscreen/Exit Fullscreenf
Mute/Unmutem
Seek %0-9

Next Up
Cat Breed Jokes
01:07
0.5x1x1.25x1.5x2x
facebook twitter Email
Linkhttps://cdn.jwplayer.com/previews/wYVLwyRG
Copied
Embed<iframe src="//cdn.jwplayer.com/players/wYVLwyRG-wjcpcdaI.html" width="640"
height="360" frameborder="0" scrolling="auto"></iframe>
Copied
Live
00:00
02:30
02:30








 



Originally Published: August 01, 2022




Brooke Nelson
Brooke is a tech and consumer products writer covering the latest in digital
trends, product reviews, security and privacy, and other news and features for
RD.com.




ADVERTISEMENT


NOW TRENDING


If You See an Elephant Statue at a Front Door, This Is What It Means

8 Common Zelle Scams to Watch Out For

Misinformation vs. Disinformation: How to Tell the Difference






 * 
 * 
 * 
 * 
 * 
 * 

 * The Healthy
 * Food
 * Home
 * Humor

 * Knowledge
 * Travel
 * Videos
 * Subscribe

Our Brands

 * Taste of Home
 * Family Handyman
 * Birds & Blooms
 * The Healthy

 * LifeRich Publishing
 * Advertise with Us
 * About Us
 * Contact Us
 * Customer Service
 * Terms of Use
 * Privacy Policy
 * Your CA Privacy Rights
 * Do Not Sell My Personal Information – CA Residents
 * Accessibility Statement
 * About Ads
 * Affiliate Program

© 2022 Trusted Media Brands, Inc.


SIGN UP FOR OUR NEWSLETTERS

Enter email address Sign Up
Enjoy the BEST stories, advice & jokes!

Search terms


We are no longer supporting IE (Internet Explorer) as we strive to provide site
experiences for browsers that support new web standards and security practices.

We recommend our users to update the browser.

 * Google Chrome
 * Apple Safari
 * Mozilla Firefox
 * Microsoft Edge

 * Arts & EntertainmentMore Items
   * Books
   * Personality Type
   * Quotes
   * Royal Family
   * Zodiac
   * ALL ARTS & ENTERTAINMENT
 * Beauty & FashionMore Items
   * Clothing
   * Hair Care
   * Hair Styles
   * Makeup
   * Shoes & Accessories
   * Skincare
   * ALL BEAUTY & FASHION
 * FoodMore Items
   * Healthy Eating
   * News & Advice
   * Recipes
   * ALL FOOD
 * Holidays & Observances
 * HomeMore Items
   * Cleaning
   * Decor
   * DIY
   * Gardening
   * Organizing
   * Pest Control
   * Repair
   * ALL HOME
 * HumorMore Items
   * Cartoons
   * Funny Stories & Photos
   * Jokes
   * ALL HUMOR
 * JokesMore Items
   * Submit Your Joke
   * Submit Your Cartoon
   * Corny Jokes
   * Funny One-Liners
   * Knock-Knock Jokes
   * Riddles
   * ALL JOKES
 * KnowledgeMore Items
   * Brain Games
   * Etiquette
   * Facts
   * Grammar & Spelling
   * Psychology
   * ALL KNOWLEDGE
 * MoneyMore Items
   * Budgeting
   * Deals
   * Retirement
   * Scams
   * Spending
   * Taxes
   * ALL MONEY
 * Pets & AnimalsMore Items
   * Cats
   * Dogs
   * ALL PETS & ANIMALS
 * RelationshipsMore Items
   * Dating
   * Friendships
   * Marriage
   * Parenting
   * ALL RELATIONSHIPS
 * TechMore Items
   * Internet
   * Personal Tech
   * ALL TECH
 * TravelMore Items
   * Airlines
   * Airport Security
   * Packing & Accessories
   * Vacations
   * ALL TRAVEL
 * True StoriesMore Items
   * Holiday Stories
   * Inspiring Stories
   * Love Stories
   * Nicest Places
   * Survival Stories
   * ALL TRUE STORIES
 * Work & CareerMore Items
   * Career Planning
   * Succeeding at Work
   * ALL WORK & CAREER
 * Videos
 * Contests
 * Shop
 * Subscribe
 * Newsletters
 * About Us
 * Follow UsMore Items
   * Facebook
   * Pinterest
   * Instagram
   * Twitter