What is 'Spoofing'

Spoofing is a type of scam where an intruder attempts to gain unauthorized access to a user's system or information by pretending to be the user. The main purpose is to trick the user into releasing sensitive information in order to gain access to one's bank account, computer system or to steal personal information, such as passwords.

BREAKING DOWN 'Spoofing'

There are several kinds of spoofing, including email, caller ID, and uniform resource locator (URL) and GPS spoof attacks.

Email spoofing (or phishing), used by dishonest advertisers and outright thieves, occurs when email is sent with falsified “From:” entry to try and trick victims that the message is from a friend, their bank, or some other legitimate source. Any email that claims it requires your password or any personal information could be a trick.

In a caller ID attack, the spoofer will falsify the phone number from which they are calling.

URL spoofing is when scammers set up a fraudulent website to obtain information from victims or to install viruses on their computers. For instance, targets might be directed to a site that looks like it’s from their credit card company and be asked to log in. If one falls for it and actually logs in, the scammer could then log onto the real site and commit mishap by using the account information the victim used to log in. (For more, see: 6 Ways To Protect Yourself From Cybercrime)

A GPS spoofing attack attempts to deceive a GPS receiver by broadcasting incorrect GPS signals, structured to resemble a set of normal GPS signals, or by rebroadcasting genuine signals captured elsewhere or at a different time. Spoofed signals may be modified in such a way as to cause the receiver to wrongly estimate its position or to be located where it is but at a different time, as determined by the attacker. One common form of a GPS spoofing attack, commonly termed a carry-off attack, begins by broadcasting signals synchronized with the genuine signals observed by the target receiver. The power of the counterfeit signals is then gradually increased and drawn away from the genuine signals.

What To Do About Spoofing Attacks

Be extremely cautious whenever you receive a message asking for personal information and only download files from trusted sources. Install firewalls to block suspicious inquiries and keep antivirus software installed and up-to-date on any computer you use. If you get an inquiry seeking personal information, don’t provide it. Hang up (or log off) and then independently look up the phone number or customer service email address from the entity purportedly contacting you for your personal information. If you think you’ve been spoofed, contact the FCC at 1-888-CALL-FCC or via email at www.fcc.gov/complaints.

RELATED TERMS
  1. Phishing

    Phishing is a method of identity theft carried out through the ...
  2. Spoofy

    Spoofy is the nickname for a mysterious cryptocurrency trader ...
  3. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  4. Accounting Information System - ...

    An accounting information system is the collection, storage and ...
  5. Data Breach

    A data breach is an unauthorized access and retrieval of sensitive ...
  6. Reloaded

    Reloaded is a slang term meaning that a consumer who was previously ...
Related Articles
  1. Tech

    Cybersecurity: Protect Yourself This Tax Season

    Take a little extra time to review online communications and avoid becoming a cybercrime victim.
  2. Insights

    10 Tips To Avoid Common Financial Scams

    Remember that "don't talk to strangers" rule from childhood? Well, don't wire them money either. Or fall for these other tricks.
  3. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  4. Tech

    11 Ways to Help Prevent Identity Theft

    Identity theft is no joke. Here are 11 ways to help prevent falling victim to it.
  5. Tech

    9 Ways to Protect Your Cell Phone From Identity Theft

    Thanks to lax phone security and sophisticated hackers, cell phones are the target for identity theft.
  6. Tech

    7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
  7. Tech

    Stop Scams in Their Tracks

    Find out how to protect yourself and your loved ones from financial fraudsters.
  8. Taxes

    Don't Get Scammed by Fake IRS Phone Calls

    There's been an increase in fraudulent phone calls and emails from people pretending to be the IRS. Here's how to know if you're being scammed.
  9. Tech

    7 Ways to Protect Against Credit Card Hacks

    If your credit card hasn't been hacked yet, it may just be a matter of time. Here's how to protect yourself as much as possible before and after it happens.
  10. Tech

    How to Protect Your Data From Being Hacked

    Identity theft and credit card fraud can happen to anyone. Use these tips to help keep your personal information safe.
RELATED FAQS
  1. What are the most common scams regarding Social Security benefits?

    Learn about some of the most common Social Security scams that occur by phone, email and direct mail, and how to recognize ... Read Answer >>
  2. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  3. What are the dangers of using the Electronic Federal Tax Payment System (EFTPS)?

    The Electronic Federal Tax Payment System (EFTPS) is a convenient way to file your taxes, but you need to be aware of some ... Read Answer >>
Trading Center