IsThisAScam
HjemBlogPriserOm osHistoryAPIExtension
Upgrade
DA
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produkt
  • Home
  • Blog
  • Pricing
  • Om os
  • History
  • Chrome Extension
Resources
  • Developers
  • API-dokumentation
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisk
  • Privatlivspolitik
  • Servicevilkår
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rettigheder forbeholdes.

Built for the calm, the cautious, and the careful.

Home/Glossary/Spoofing
Glossary · Attack Vector

What Is Spoofing?

The act of disguising a communication or identity to appear as a trusted source. Spoofing can target email addresses, phone numbers (caller ID), IP addresses, websites, or even GPS signals.

Quick Definition

The act of disguising a communication or identity to appear as a trusted source. Spoofing can target email addresses, phone numbers (caller ID), IP addresses, websites, or even GPS signals.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Spoofing explained.

Spoofing is a foundational technique used in many types of cyberattacks. It's the digital equivalent of wearing a disguise. By making communications appear to come from a trusted source, attackers dramatically increase the likelihood that victims will engage with malicious content.

Email spoofing changes the "From" field of an email to show any address the attacker wants. Caller ID spoofing makes a phone call appear to come from a legitimate number, like your bank. Website spoofing creates a copy of a legitimate website at a similar-looking URL.

Spoofing is enabler of phishing, vishing, smishing, and many other attacks. Technologies like SPF, DKIM, and DMARC were created to combat email spoofing, but adoption is still incomplete across the internet.

02How it works.

01The attacker chooses a trusted identity to impersonate (bank, government agency, colleague)
02Technical tools are used to forge the "from" field of emails, caller ID, or website addresses
03The spoofed communication appears to come from the legitimate source
04The victim, trusting the apparent sender, engages with the malicious content
05Credentials are stolen, malware is installed, or fraudulent transactions are authorized

03Real-world example.

In 2024, scammers spoofed the caller ID of a major UK bank and called customers claiming to be the fraud department. Because the phone number matched the one on the back of their bank cards, many victims trusted the callers and provided one-time passcodes that were used to drain their accounts.

04How to protect yourself.

01Don't trust caller ID alone — call back using the number from the official website
02Check email headers to verify the true sender, not just the display name
03Verify website URLs character by character before entering credentials
04Organizations should implement SPF, DKIM, and DMARC to protect their email domains
05Use IsThisAScam to check whether an email's headers match its claimed sender
Related Terms
PhishingVishingPharmingDKIMSPFDMARC
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →