IsThisAScam
HomeBlogPrijzenOver OnsHistoryAPIExtension
Upgrade
NL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Product
  • Home
  • Blog
  • Pricing
  • Over Ons
  • History
  • Chrome Extension
Resources
  • Developers
  • API-documentatie
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisch
  • Privacybeleid
  • Servicevoorwaarden
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rechten voorbehouden.

Built for the calm, the cautious, and the careful.

Home/Glossary/Pretexting
Glossary · Social Engineering

What Is Pretexting?

A social engineering technique where an attacker creates a fabricated scenario (pretext) to manipulate a victim into providing information, granting access, or performing an action they wouldn't normally do.

Quick Definition

A social engineering technique where an attacker creates a fabricated scenario (pretext) to manipulate a victim into providing information, granting access, or performing an action they wouldn't normally do.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Pretexting explained.

Pretexting is storytelling with malicious intent. The attacker crafts a believable scenario — they might pretend to be a coworker from another office, an IT technician performing maintenance, a bank employee verifying an account, or even a law enforcement officer.

What makes pretexting effective is the preparation. Attackers research their targets thoroughly, learning organizational structures, internal terminology, and personal details that make their cover story convincing.

Unlike phishing, which often relies on urgency and mass messaging, pretexting involves sustained deception. The attacker may build a relationship over multiple interactions before making their actual request.

02How it works.

01The attacker develops a detailed cover story (pretext) that gives them a plausible reason to request information
02They research the target and organization to make the pretext convincing
03Contact is made, establishing the fake identity through confident, knowledgeable conversation
04Trust is built over one or more interactions before the critical request is made
05The target provides the requested information or access, believing the scenario is genuine

03Real-world example.

A social engineer called a company's help desk posing as a new employee who had locked themselves out of their account. Using details gathered from LinkedIn and the company website, they convincingly answered security questions and obtained password reset access to a senior manager's account.

04How to protect yourself.

01Verify the identity of anyone requesting sensitive information through independent channels
02Establish callback procedures — hang up and call the person's known number
03Implement strict identity verification protocols for password resets and access requests
04Limit publicly available information about organizational structures and procedures
05Train employees to recognize common pretexting scenarios
Related Terms
Social EngineeringPhishingVishingBusiness Email Compromise (BEC)
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →