To put it simply, spoofing is when a hacker impersonates another user, computer system or network in order to spread malware, exploit network and system vulnerabilities, steal data, or bypass certain access controls to corporate networks.
Like real-life con-artists, online criminals use impersonation to steal information or gain access to bank accounts. It is especially dangerous with corporate accounts, financial platforms, exchanges and anything valuable and important there is online.
The most common forms of spoofing are: IP address spoofing
— disguising the original IP address and masquerading as a legitimate entity. Frauds create Internet Protocol packets that have a false IP address source and by that, hiding one's identity or faking the identity of another computing system.
Often used in DoS assaults such as flooding web services or crashing them. DNS server spoofing — modifying DNS server to redirect domain name to a random IP address. It is commonly how the malevolent viruses are spread
Phishing and email spoofing
— forging an email header to appear like it came from someone or somewhere trustworthy other than the actual source.
Have you heard of an infamous scan that was thriving a few years ago? Many people received a fake email from a so-called wealthy relative that left them a fortune asking for your personal information. All turned out to be scams in the end. But how many people fell for it?Caller ID spoofing
- changing the number that shows on Caller ID to trick you. The fake caller will be disguised under a legitimate business or governmental number.
It is a part of common phone frauds and scams. Sometimes frauds call you pretending to be banks and fintech companies and ask for the PIN to proceed with some payment. Do you know how many people respond without even thinking twice?Facial spoof attacks
— online verification spoofing is another channel hackers use to break into people's accounts.
Frauds use masks, fake IDs, 3D avatars — anything that can get them access to someone else's data. To stop them from doing so, there is anti spoofing.