Term: spoofing
spoofing (noun) /ˈspuː.fɪŋ/
- A cyberattack where a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. LV: krāpnieciska imitēšana, identitātes viltošana.
In cybersecurity, spoofing is essentially “digital masquerading.” The attacker pretends to be a trusted source to steal data, spread malware, or bypass network access controls.
Common Types of Spoofing
- Email Spoofing: The attacker alters the “From” address in an email so it appears to come from a known contact or a legitimate organization (like a bank).
- IP Spoofing: An attacker sends packets from a false IP address to hide their identity or to impersonate another computer system.
- Website (URL) Spoofing: Creating a fake website that looks exactly like a real one (e.g., a login page for PayPal or Facebook) to steal credentials.
- Caller ID Spoofing: Making the phone’s caller ID display a local number or a trusted agency to increase the chance of the victim answering.
- ARP Spoofing: A more technical attack where the attacker links their MAC address to the IP address of a legitimate device on a local network, allowing them to intercept data.
Spoofing vs. Phishing
These two terms are often used together, but they are different:
- Spoofing is the tactic of faking an identity (the “disguise”).
- Phishing is the scam itself (the “hook”)—using that disguise to trick someone into giving up information.
How to Prevent Spoofing
- Authentication Protocols: Use tools like SPF (Sender Policy Framework) and DKIM for emails to verify the sender.
- MFA (Multi-Factor Authentication): Even if an attacker “spoofs” your login page and gets your password, they can’t get in without the second code.
- Encryption: Using HTTPS and VPNs ensures that even if traffic is intercepted, it cannot be read.
- Packet Filtering: Routers can be configured to reject packets that claim to come from inside the network but actually originate from outside (a key defense against IP spoofing).
Merriam-Webster Online Thesaurus