IsThisAScam
InicioBlogPreciosAcerca deHistoryAPIExtension
Upgrade
ES
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Producto
  • Home
  • Blog
  • Pricing
  • Acerca de
  • History
  • Chrome Extension
Resources
  • Developers
  • Docs de API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Legal
  • Política de Privacidad
  • Términos de Servicio
  • product@zeplik.com

© 2026 Zeplik, Inc. Todos los derechos reservados.

Built for the calm, the cautious, and the careful.

Home/Glossary/Shoulder Surfing
Glossary · Attack Vector

What Is Shoulder Surfing?

The practice of observing someone as they enter sensitive information — PINs, passwords, credit card numbers — by looking over their shoulder, using binoculars, or recording with a camera, typically in public places.

Quick Definition

The practice of observing someone as they enter sensitive information — PINs, passwords, credit card numbers — by looking over their shoulder, using binoculars, or recording with a camera, typically in public places.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Shoulder Surfing explained.

Shoulder surfing is one of the simplest forms of information theft, requiring no technical skill — just proximity and observation. It can happen anywhere: at ATMs, in coffee shops, on public transit, at airports, or in any public space where people access their devices.

Modern shoulder surfing goes beyond physically peering over someone's shoulder. Hidden cameras at ATMs, long-range cameras in public spaces, and even screen-recording malware accomplish the same goal. In 2023, iPhone theft rings were found to observe victims entering their passcodes in bars before stealing the phones.

The information gained through shoulder surfing can enable a cascade of more serious crimes: account takeover, identity theft, financial fraud, and unauthorized access to corporate systems.

02How it works.

01The attacker positions themselves where they can observe the victim entering information
02They watch or record the victim typing passwords, PINs, or other sensitive data
03The observed information is memorized, written down, or captured on camera
04The attacker uses the stolen credentials to access accounts or make unauthorized transactions
05In advanced cases, the attacker also steals the physical device (phone, card) for immediate access

03Real-world example.

A 2023 Wall Street Journal investigation revealed a crime wave where thieves observed iPhone users entering their passcodes in bars and restaurants, then stole the phones. With the passcode, they could change the Apple ID password, lock the owner out, access Apple Pay, and drain bank accounts.

04How to protect yourself.

01Shield the keypad when entering PINs and passwords in public
02Use biometric authentication (Face ID, fingerprint) instead of passcodes when possible
03Be aware of your surroundings, especially at ATMs and when entering sensitive information
04Use a privacy screen protector on your laptop and phone
05Set a separate, complex passcode for your phone (not just 4 digits)
Related Terms
SkimmingIdentity TheftSocial EngineeringTailgating
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →