Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

Pretexting

Pretexting is a form of social engineering attack in which cybercriminals construct elaborate false identities and believable fictional scenarios to establish trust with a target before requesting sensitive data, credentials, or actions that compromise security. Unlike direct phishing attempts that immediately request credentials, pretexting operates as trust-building infrastructure that enables advanced, multi-stage campaigns.

How Pretexting Works

Pretexting attackers invest significant time crafting convincing personas and backstories before making any requests. While phishing relies on urgency and fear to bypass rational thinking, pretexting relies on building trust and legitimacy over time.

A common example involves an attacker impersonating an IT support technician who contacts employees claiming to need login credentials to resolve a fabricated technical issue. The attacker may reference real company systems, use legitimate-sounding names and departments, and create a believable context that makes the request seem reasonable.

Common Pretexting Scenarios

IT Impersonation: Attackers pose as IT staff, help desk personnel, or technology vendors to request credentials, remote access, or security configuration information under the guise of troubleshooting or maintenance.

Executive Impersonation: Criminals impersonate senior executives or board members to pressure employees into taking actions like wire transfers, sharing confidential financial data, or bypassing normal approval processes.

Vendor Impersonation: Attackers pose as trusted vendors, suppliers, or business partners to access financial systems, redirect payments, or obtain proprietary information.

Government or Regulatory Impersonation: Fraudsters claim to be from government agencies, law enforcement, or regulatory bodies to create urgency and authority around requests for sensitive data.

New Employee Scenarios: Attackers pose as new employees who need help accessing systems, using the natural inclination of helpful colleagues to bypass security controls.

Pretexting vs. Other Social Engineering

Pretexting is distinguished from simple phishing by the depth of preparation and the extended trust-building phase. While a phishing email is typically a one-time interaction, a pretexting attack may involve multiple communications over days or weeks, progressively building credibility and extracting more sensitive information with each interaction.

Human error is the most exploited vulnerability

Build a security-aware culture and deploy behavioral AI that catches what awareness training misses.

Reduce human risk