IsThisAScam
HomeBlogPrijzenOver OnsHistoryAPIExtension
Upgrade
NL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Product
  • Home
  • Blog
  • Pricing
  • Over Ons
  • History
  • Chrome Extension
Resources
  • Developers
  • API-documentatie
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisch
  • Privacybeleid
  • Servicevoorwaarden
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rechten voorbehouden.

Built for the calm, the cautious, and the careful.

Home/Glossary/Baiting
Glossary · Social Engineering

What Is Baiting?

A social engineering attack that lures victims with something enticing — a free download, a USB drive left in a parking lot, or a too-good-to-be-true offer — to trick them into compromising their security.

Quick Definition

A social engineering attack that lures victims with something enticing — a free download, a USB drive left in a parking lot, or a too-good-to-be-true offer — to trick them into compromising their security.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Baiting explained.

Baiting exploits human curiosity and greed. The attacker offers something attractive — free software, music, movies, or even physical items like USB drives — that contains hidden malware or leads to credential-harvesting websites.

Physical baiting involves leaving infected USB drives, CDs, or devices in places where targets will find them: parking lots, lobbies, break rooms, or conference venues. The natural curiosity to plug in the device and see its contents does the rest.

Digital baiting uses fake download sites, free software offers, pirated content, or exclusive deals as lures. Once the victim downloads the bait, malware is installed that can steal data, encrypt files for ransom, or provide remote access to the attacker.

02How it works.

01The attacker creates an attractive lure — free content, a found USB drive, or an exclusive offer
02The bait is placed where targets will encounter it (online ads, parking lots, forums)
03The victim's curiosity or desire for the free item overrides caution
04Engaging with the bait installs malware, steals credentials, or compromises the device
05The attacker gains access to the victim's system, data, or network

03Real-world example.

In a 2016 experiment, researchers dropped 297 USB drives across a university campus. Nearly 48% were picked up and plugged into computers, with the first drive connected within just 6 minutes of being dropped. In a real attack scenario, each of those connections could have resulted in a system compromise.

04How to protect yourself.

01Never plug in USB drives or devices you find in public places
02Be skeptical of free downloads, especially from unfamiliar websites
03If an offer seems too good to be true, it almost certainly is
04Use antivirus software that scans removable media automatically
05Report found devices to your IT security team rather than plugging them in
Related Terms
Social EngineeringMalwareTrojanRansomware
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →