Anti-Spoofing: the Essential Security Tool you Forgot to Implement

Spoofing — what is it and how to defend against it

Spoofing is an impersonation of a customer, device or user online. Remember when in movies hackers always try to cyber-attack Pentagon? Well it is most likely that they also use spoofing to cover up their tracks afterwords.

Modern day spoofing stretches as far as impersonation or identity theft during online identification and faking liveness. All to get hold of people’s accounts and steal from platforms.

Let’s start from the basics
To put it simply, spoofing is when a hacker impersonates another user, computer system or network in order to spread malware, exploit network and system vulnerabilities, steal data, or bypass certain access controls to corporate networks.

Like real-life con-artists, online criminals use impersonation to steal information or gain access to bank accounts. It is especially dangerous with corporate accounts, financial platforms, exchanges and anything valuable and important there is online.

The most common forms of spoofing are:

IP address spoofing — disguising the original IP address and masquerading as a legitimate entity. Frauds create Internet Protocol packets that have a false IP address source and by that, hiding one’s identity or faking the identity of another computing system.

Often used in DoS assaults such as flooding web services or crashing them. DNS server spoofing — modifying DNS server to redirect domain name to a random IP address. It is commonly how the malevolent viruses are spread

Phishing and email spoofing
— forging an email header to appear like it came from someone or somewhere trustworthy other than the actual source.

Have you heard of an infamous scan that was thriving a few years ago? Many people received a fake email from a so-called wealthy relative that left them a fortune asking for your personal information. All turned out to be scams in the end. But how many people fell for it?

Caller ID spoofing — changing the number that shows on Caller ID to trick you. The fake caller will be disguised under a legitimate business or governmental number.

It is a part of common phone frauds and scams. Sometimes frauds call you pretending to be banks and fintech companies and ask for the PIN to proceed with some payment. Do you know how many people respond without even thinking twice?

Facial spoof attacks — online verification spoofing is another channel hackers use to break into people’s accounts.

Frauds use masks, fake IDs, 3D avatars — anything that can get them access to someone else’s data. To stop them from doing so, there is anti spoofing.

If you like how we think – check out other posts and solutions at Sumsub.

How do we fight the spoofs?
There are many methods that help in catching spoofs and all of them share a common name — antispoofing. So, what is it exactly?

Anti spoofing is a generalized notion for different types of technology that identifies and blocks false source addresses, fake messages, calls and reveals liveness imposters.

Here is how antispoofing works in different cases:

IP and DNS 
The aftermath of IP address faking and DoS spoofing attacks is very expensive for service providers. More than that, it damages the reputation of business owner, the brand itself, reduces customer trust and impacts their operations.

By filtering packets with incorrect source IP address it prevents them from entering and leaving the network. Such software is used to protect you from imposters getting to your or your client’s confidential data, stealing money, infiltrating your network and crashing it.

Email and Phone
In addition to blocking numbers and emails from known fraudsters, antispoofing solutions also provide suspected spam warnings and lets you manually block and report unsolicited text messages from unknown numbers, emails and callers.

Liveness
Anti spoofing is now broadly used in the most advanced technological solutions such as KYC, AML and liveness detection.

Based on tried and trusted technologies, proper facial verification leaves no room for false positives. Screening for depth and texture of the image, detecting natural emotions and muscle micromotions it works out if a person is actually who they claim to be.

Saving you from the dangers of the digital world since 2015. Are you ready to onboard?

Stay updated with Sumsub by signing up for our newsletter

Sign up for our Newsletter

Be up and running in minutes.

Questions? Schedule some time to talk with one of our experts.

By clicking the button you agree with our Privacy Policy.

Thank you for subscribing to our newsletters.

Thanks for contacting us!

We will get in touch with you shortly.