Social EngineeringHigh
Pretexting
A social engineering attack where an attacker fabricates a scenario (pretext) to trick a target into revealing sensitive information.
Skill Paths:
Social EngineeringSecurity AwarenessIncident Response
Job Paths:
Security Awareness TrainerSOC AnalystFraud Investigator
Relevant Certifications:
CISSPCompTIA Security+CEH
Content
Pretexting
Pretexting is a social engineering technique in which an attacker fabricates a scenario (pretext) to trick a target into revealing sensitive information or performing actions that compromise security. The attacker often impersonates a trusted individual or authority to gain the victim's trust.
How Pretexting Works
- Scenario Creation: Attacker invents a believable story or identity
- Engagement: Attacker contacts the target (phone, email, in-person)
- Manipulation: Uses the pretext to request sensitive information or access
- Exploitation: Uses obtained information for further attacks or fraud
Common Pretexts
- IT support requesting login credentials
- Bank representative verifying account details
- Law enforcement seeking confidential information
- Vendor requesting payment or contract details
Prevention and Detection
- Security Awareness Training: Educate employees about social engineering
- Verification Procedures: Always verify identities before sharing information
- Incident Reporting: Encourage reporting of suspicious requests
- Access Controls: Limit access to sensitive information
Real-World Examples
- Attackers posing as HR to obtain employee data
- Impersonating executives to authorize wire transfers
- Fake IT support calls to reset passwords
Related Concepts
- Phishing: Deceptive emails or messages
- Vishing: Voice-based attacks
- Impersonation: Pretending to be someone else
Conclusion
Pretexting is a powerful social engineering tactic. Organizations must train employees, enforce verification procedures, and foster a culture of security awareness to defend against these attacks.
Quick Facts
Severity Level
7/10
Attack Vector
Fabricated scenario or identity
Goal
Obtain sensitive information or access
Targets
Employees, customers, executives
Related Terms