www.rd.com
Open in
urlscan Pro
2606:4700:4400::ac40:9573
Public Scan
Submitted URL: https://click.email.rd.com/?qs=1c1850b33d0b9c3525b9114b00af26b2b904c95f6e467773a32105cf363c181e6cdb313f83b6c923e643d1c5a0c7...
Effective URL: https://www.rd.com/article/spoofing/?_cmp=readuprdus&_ebid=readuprdus8182022&_mid=523412&ehid=23CBB59D03EC6926B99D3...
Submission: On August 18 via api from US — Scanned from DE
Effective URL: https://www.rd.com/article/spoofing/?_cmp=readuprdus&_ebid=readuprdus8182022&_mid=523412&ehid=23CBB59D03EC6926B99D3...
Submission: On August 18 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST https://www.rd.com/newsletter/?posturl=https://www.rd.com/article/spoofing
<form action="https://www.rd.com/newsletter/?posturl=https://www.rd.com/article/spoofing" method="post" data-name="newslettersignup" data-module="newslettersignup" data-position="footer">
<label class="hidden" for="email-footer">Enter email address</label>
<input type="text" id="email-footer" name="email" placeholder="Email Address" aria-label="Add email address">
<button type="submit" id="subscribe-footer">Sign Up</button>
</form>
GET https://www.rd.com
<form class="pure-form" id="hamburger-searchform" role="search" method="get" action="https://www.rd.com">
<div class="hamburger-search-form-wrapper">
<label class="hidden" for="s"> Search terms </label>
<input class="hamburger-searchbar" type="text" value="" name="s" id="s" placeholder="Search">
<input type="submit" class="hamburger-searchsubmit search-button" aria-label="Search">
</div>
</form>
Text Content
Share Save Saved Share on Facebook Save on Pinterest Tweet this Email Next * * * * * Skip to main content A Trusted Friend in a Complicated World Sign Up for Newsletters Subscribe Now Give a Gift SUBSCRIBE & SAVE 1 Year for Only $10! Give a gift SUBSCRIBE RD LARGE PRINT 1 Year for Only $18! Give a gift SUBSCRIBE Sign Up for Newsletters Subscribe Subscribe 1 Year for Only $10! RD Large Print 1 Year for Only $18! Sign Up for Newsletters * The Healthy * Food * Home * Humor * Knowledge * Holidays * Subscribe ADVERTISEMENT * * * * * RD.COM Money Scams WHAT IS SPOOFING, AND HOW CAN YOU SPOT IT? Brooke NelsonUpdated: Aug. 02, 2022 RD.com, Getty Images SPOOFING IS A FUNNY WORD, BUT ITS CONSEQUENCES ARE SERIOUS. HERE'S HOW SPOOFING WORKS, THE MANY FORMS IT CAN TAKE AND HOW TO PROTECT YOURSELF AGAINST IT. * * * * * Just when you think you know how to avoid security threats online, cybercriminals keep getting savvier. Spoofing—a scam in which a criminal pretends to be someone else so they can commit fraud, spread malware or carry out other cyberattacks—is the latest in a long list of online scams to keep on your radar. Here’s the good news: Taking simple security measures, like learning about spam texts to delete immediately, the area codes phone scam and the four-word phone scam, can make it harder for fraudsters to fool you. To help you stay safe, we’ve asked cybersecurity experts to explain how spoofing works and what you can do to avoid falling victim. WHAT IS AN EXAMPLE OF SPOOFING? A spoofing scam might be an email, text message or phone call that appears to be from a trusted source, like a loved one or even a popular brand. But in reality, a fraudster is behind the fake email address or phone number, hoping to convince you to download malicious software, send money or share personal information or data with them. Spoofing attacks can take many forms. In one recent example, hackers created phony Zoom invitations for virtual meetings at community associations and school boards. Victims who clicked on the document attached to the emails infected their devices with malware. Other examples of spoofing include emails posing as a request from PayPal or eBay for your login information, or text messages that appear to be money transfers from an online wallet or bank. RD.com via hooksecurity.co IS SPOOFING A CRIME? Spoofed emails, phone calls or text messages that lead to criminal acts such as attempted hacking, fraud or financial theft are illegal, according to Karim Hijazi, CEO of cyber intelligence company Prevailion and a former contractor for the U.S. intelligence community. It happens more often than you think too. In a recent FBI report, people reported losing more than $82 million to spoofing scams in 2021. If you are the victim of spoofing or other online fraud, you can file a complaint with the FBI’s Internet Crime Complaint Center (IC3), as well as your local police station if you lost money. FYI, these Venmo scams, Amazon scams and Facebook Marketplace scams could also steal your money. SPOOFING BY TEXT HOW IT WORKS In spoofed text messages, fraudsters disguise their sender ID to appear as someone or something they are not. They might claim to be your boss or family member, or they might impersonate a familiar company like Amazon or your bank. Either way, their goal is to trick you into sharing personal data or clicking a link that infects your phone with a virus. Unfortunately, it’s now easier than ever to create spoofed text messages. Most criminals use a software that allows them to create any sender ID they choose. “It used to require a business phone system to spoof caller ID, but now anyone can download an app from the App Store enabling them to make spoofed calls or texts,” says Aaron Higbee, co-founder and chief technology officer at cybersecurity firm Cofense. WHY IT’S DANGEROUS The biggest danger of spoofing by text message: It is extremely difficult and sometimes impossible to recognize. “Spoofed text messages can sometimes be indistinguishable from legitimate messages, so the reader really has to pay attention,” says Andrew Barratt, vice president of technology and enterprise at cybersecurity firm Coalfire. Not only are spoofing texts tough to spot, but they can also cause serious harm to victims. For example, by clicking a link attached to the text message, you could accidentally download malware that allows someone to spy on your iPhone. If a fraudster can convince you that they are from your bank, you might share financial or other sensitive information with them. Victims can also be fooled into sending money to a criminal if they believe they are texting a loved one. HOW TO RECOGNIZE A SPOOFING TEXT Beware of any text message from a phone number that you don’t recognize, says Higbee. If you receive a message that appears to be a fraud detection or billing alert from a company you do business with, like your bank, look up the company’s publicly listed number and call them directly to confirm the message. These alerts are among the most popular tricks that fraudsters use today, Higbee says. You should also learn how to stop spam texts in the first place. SPOOFING BY PHONE CALL HOW IT WORKS Like spoofed text messages, spoofing by phone call relies on technology that allows criminals to create a fake caller ID. Then they can place calls pretending to be Amazon, PayPal, your bank or any other familiar business in order to steal money or sensitive information. For example, attackers may call someone to warn them about a fraud alert on their account and then offer to help, according to Higbee. By tricking the victim into sharing their login information, fraudsters can gain access to the person’s account and to any sensitive data it contains, like credit card numbers. These free password managers can help keep your log-ins secure from hackers. WHY IT’S DANGEROUS People often fall victim to spoofed phone calls because mobile carriers are not able to block these calls or alert people that the call may be a scam, according to Hijazi. “For the recipient of the call, everything appears legitimate,” he says. “When your bank’s name appears in your caller ID, it’s easy to be fooled.” Hijazi also notes that criminal call centers have gotten very good at imitating the real customer service procedures of legitimate organizations like banks, which makes it even harder for the victim to realize they’re being conned. Stay ahead of spoofing phone calls by learning how to stop robocalls for good. HOW TO RECOGNIZE A SPOOFING CALL If you receive a suspicious call, Barratt recommends paying attention to the quality of the audio. “The perpetrator is likely to be using a low-grade internet phone service that results in poor call quality,” he says. Always verify that the call is legitimate by contacting the company directly before handing over any sensitive information like your login credentials or credit card numbers. Urgent requests to share information, send money, click a link or download an attachment should be viewed with suspicion, according to Hijazi. “These scammers are very good at preying on our anxieties, and they will also try to move quickly to prevent the person from having time to think,” he says. SPOOFING BY EMAIL HOW IT WORKS Believe it or not, spoofing is one of the many things hackers can do with just your email address. “Email historically has been very [easy] to spoof,” Barratt says. All fraudsters need to do is create a forged sender address that looks like yours, making small and tough-to-spot changes, like adding a period or swapping a number with a letter. Then they use the email address to send “spoof” messages containing harmful malware or urgent requests for money. Keep in mind that “spoofing isn’t the same thing as hacking,” Hijazi says. “When a person’s email is spoofed, it hasn’t actually been compromised by the hacker. It’s just been copied.” You could receive spoofed emails too. With email spoofing, attackers are hoping to fool you by assuming the identity of a person or organization you know and asking you for money, sensitive information or other favors. The sender’s title mimics the real person’s or organization’s name, but the email address is slightly different from their actual one. WHY IT’S DANGEROUS A spoofed email address looks legitimate, so email spoofing allows scammers to bypass the spam filters on most email accounts. Once spoofed emails make it into an inbox, victims are much more likely to open and fall for them. “People assume that when a sender’s name appears in their inbox, it’s the real person,” Hijazi says. “But this is very easy to fake.” Email spoofing is the number one way people and companies get hacked, according to Hijazi. “You can be scammed out of money or personal information, lose access to your accounts or wind up with a malware infection on your device,” he says. Malware attacks that rely on phishing emails, such as these Apple ID phishing scams, are on the rise as well. What’s more, spoofed emails might be linked to sextortion schemes, which lure the victim into engaging in a private conversation or sending sensitive images of themselves that are later used for blackmail. Hackers may also impersonate a law enforcement agency and claim they have proof that you have engaged in illegal activities, like accessing child pornography, Hijazi warns. HOW TO RECOGNIZE A SPOOFING EMAIL Receiving any emails from a contact through a new sender address should be a red flag that you might be dealing with a spoofing attack. Higbee advises being skeptical of any explanation as to why the sender is using a new email address. “When an attacker spoofs the friendly name, they will usually have a lie to explain why they are using a new email address,” he says. Instead, reach out to your contact in person or by phone call to confirm that the message is real. For spoofing emails from companies or brands, Hijazi recommends checking the sender address to make sure it matches the sender’s name and actual email address. He also suggests looking for grammar and spelling mistakes, as well as any errors in the email format, which could indicate the email is not legitimate. Luckily, “many online mail providers are already picking up spoof emails with the additional security they provide to help users with spam,” Barratt says. Still, you should always stay alert for spoofing emails and other phishing attacks in your inbox. OTHER TYPES OF SPOOFING There are many other types of online spoofing to watch out for, and not all of it is related to financial fraud, experts say. For example, name spoofing—when fraudsters spoof the names of people with large audiences online to promote pyramid schemes or cryptocurrencies—is common on Twitter, YouTube and other social media platforms, Higbee says. Don’t assume screenshots of text messages are legitimate, either, Higbee says. People can fabricate a conversation with someone by spoofing their phone number, screenshotting it and claiming the messages are a real conversation. This can cause personal and reputational damage for the spoofed person. To keep your own info from falling into the wrong hands—and potentially leading to a spoofing attack—know the security risks of using public Wi-Fi networks and prevent companies from buying and selling your personal information. Sources: * Karim Hijazi, CEO of Prevailion * Aaron Higbee, co-founder and chief technology officer at Cofense * Andrew Barratt, vice president of technology and enterprise at Coalfire * FBI: “Internet Crime Report 2021” * Avanan: “Local Meetings Under Attack” rd.com, Getty Images (2) HOW DOXXING SETS YOU UP TO BE HACKED Boris Zhitkov/Getty Images HOW TO CREATE GOOD PASSWORDS monsitj/Getty Images HOW TO DISAPPEAR FROM THE INTERNET POPULAR VIDEOS ⓘ More From Reader's Digest 0 seconds of 2 minutes, 30 secondsVolume 0% Press shift question mark to access a list of keyboard shortcuts Keyboard ShortcutsEnabledDisabled Play/PauseSPACE Increase Volume↑ Decrease Volume↓ Seek Forward→ Seek Backward← Captions On/Offc Fullscreen/Exit Fullscreenf Mute/Unmutem Seek %0-9 Next Up Cat Breed Jokes 01:07 0.5x1x1.25x1.5x2x facebook twitter Email Linkhttps://cdn.jwplayer.com/previews/wYVLwyRG Copied Embed<iframe src="//cdn.jwplayer.com/players/wYVLwyRG-wjcpcdaI.html" width="640" height="360" frameborder="0" scrolling="auto"></iframe> Copied Live 00:00 02:30 02:30 Originally Published: August 01, 2022 Brooke Nelson Brooke is a tech and consumer products writer covering the latest in digital trends, product reviews, security and privacy, and other news and features for RD.com. ADVERTISEMENT NOW TRENDING If You See an Elephant Statue at a Front Door, This Is What It Means 8 Common Zelle Scams to Watch Out For Misinformation vs. Disinformation: How to Tell the Difference * * * * * * * The Healthy * Food * Home * Humor * Knowledge * Travel * Videos * Subscribe Our Brands * Taste of Home * Family Handyman * Birds & Blooms * The Healthy * LifeRich Publishing * Advertise with Us * About Us * Contact Us * Customer Service * Terms of Use * Privacy Policy * Your CA Privacy Rights * Do Not Sell My Personal Information – CA Residents * Accessibility Statement * About Ads * Affiliate Program © 2022 Trusted Media Brands, Inc. SIGN UP FOR OUR NEWSLETTERS Enter email address Sign Up Enjoy the BEST stories, advice & jokes! Search terms We are no longer supporting IE (Internet Explorer) as we strive to provide site experiences for browsers that support new web standards and security practices. We recommend our users to update the browser. * Google Chrome * Apple Safari * Mozilla Firefox * Microsoft Edge * Arts & EntertainmentMore Items * Books * Personality Type * Quotes * Royal Family * Zodiac * ALL ARTS & ENTERTAINMENT * Beauty & FashionMore Items * Clothing * Hair Care * Hair Styles * Makeup * Shoes & Accessories * Skincare * ALL BEAUTY & FASHION * FoodMore Items * Healthy Eating * News & Advice * Recipes * ALL FOOD * Holidays & Observances * HomeMore Items * Cleaning * Decor * DIY * Gardening * Organizing * Pest Control * Repair * ALL HOME * HumorMore Items * Cartoons * Funny Stories & Photos * Jokes * ALL HUMOR * JokesMore Items * Submit Your Joke * Submit Your Cartoon * Corny Jokes * Funny One-Liners * Knock-Knock Jokes * Riddles * ALL JOKES * KnowledgeMore Items * Brain Games * Etiquette * Facts * Grammar & Spelling * Psychology * ALL KNOWLEDGE * MoneyMore Items * Budgeting * Deals * Retirement * Scams * Spending * Taxes * ALL MONEY * Pets & AnimalsMore Items * Cats * Dogs * ALL PETS & ANIMALS * RelationshipsMore Items * Dating * Friendships * Marriage * Parenting * ALL RELATIONSHIPS * TechMore Items * Internet * Personal Tech * ALL TECH * TravelMore Items * Airlines * Airport Security * Packing & Accessories * Vacations * ALL TRAVEL * True StoriesMore Items * Holiday Stories * Inspiring Stories * Love Stories * Nicest Places * Survival Stories * ALL TRUE STORIES * Work & CareerMore Items * Career Planning * Succeeding at Work * ALL WORK & CAREER * Videos * Contests * Shop * Subscribe * Newsletters * About Us * Follow UsMore Items * Facebook * Pinterest * Instagram * Twitter