Cybersecurity Glossary

What Is Pretexting?

Pretexting is a social engineering tactic where an attacker invents a believable story to justify a request. The false story gives the target a reason to share information, approve access, send money, or make an exception.

Short definition

Pretexting uses a made-up identity, role, or situation to earn trust. The attacker may pretend to be a coworker, vendor, customer, auditor, recruiter, executive, help desk employee, or authority figure so the target treats the request as legitimate.

At a glance: The pretext is the story that makes the request feel normal. If the story is believable, the target may focus on helping instead of verifying.

Pretexting Meaning

Pretexting is one of the most useful tools in a social engineer's playbook because people make decisions from context. A request from a stranger is easy to reject. The same request from someone who appears to have a valid reason can feel routine.

The attacker may build the pretext from public information. Job titles, vendor names, office locations, product launches, social media posts, press releases, and leaked data can all help make the story sound specific. The more familiar the details, the less the target may question the setup.

Pretexting can happen through email, phone, text, chat, video, social media, support tickets, or in-person interaction. It is often paired with other tactics such as phishing, vishing, business email compromise, or fake support requests.

For businesses, pretexting is dangerous because it attacks process assumptions. If a caller sounds like a vendor and knows a few internal details, will the employee verify them? If an email appears to come from HR, will the recipient open the form? The answer depends on both training and workflow design.

How Pretexting Works

A pretexting attack builds a false context before making the sensitive request.

  1. The attacker researches the target. They gather names, roles, vendors, systems, events, habits, or personal details that can support the story.
  2. A role is chosen. The attacker may pose as HR, IT, finance, a customer, a delivery service, an auditor, an executive, or a trusted partner.
  3. The conversation starts with ordinary details. The first questions may feel harmless because they match the supposed role.
  4. The request becomes sensitive. The attacker asks for credentials, files, account changes, payment approval, customer data, or a process exception.
  5. Pressure keeps the story moving. Urgency, authority, politeness, confidentiality, or embarrassment can keep the target from verifying.

Common Pretexting Examples

Pretexting often works because the request sounds like normal business.

  • Fake HR request: An attacker claims a benefits form, tax document, or payroll update must be completed through a provided link.
  • Vendor account update: A message appears to come from a supplier asking finance to change payment instructions.
  • IT verification call: A caller says they are confirming a security issue and asks for an MFA code or password reset approval.
  • Customer support story: A fake customer pressures support to reveal account data or bypass identity checks.
  • Audit or compliance request: The attacker invokes an audit deadline to request reports, access, or confidential files.

Why Pretexting Matters

A pretext gives deception a reason. Instead of asking for sensitive information directly, the attacker wraps the request in a role, deadline, or business process that seems familiar.

The impact can include payroll fraud, vendor payment diversion, credential theft, account takeover, customer data exposure, or unauthorized physical access. A good story can pull several departments into the same incident.

Pretexting also challenges polite workplace behavior. Employees want to be helpful. They may hesitate to challenge someone who sounds senior, stressed, or knowledgeable. Attackers take advantage of that hesitation.

A healthy organization makes verification feel normal rather than rude. When employees can ask for proof, use approved callback paths, and escalate unusual requests, the story loses power.

How to Reduce Pretexting Risk

The safest response is to verify both the story and the request before taking action.

  • Verify identity independently. Use known directories, vendor portals, account records, or internal contacts rather than details provided in the message.
  • Confirm the request itself. A real person can still make an unusual request through a compromised account, so verify both who is asking and what they want.
  • Protect sensitive actions. Payments, account resets, data exports, and access changes should require documented checks.
  • Train around business scenarios. Use examples from HR, finance, support, IT, and vendor workflows so employees can recognize realistic stories.
  • Reward early reporting. Reports about strange conversations, not just confirmed attacks, help teams spot pretexting before damage occurs.

Related Pretexting Terms

Pretexting is a core social engineering tactic and often appears in payment fraud.

Pretexting Takeaway

Pretexting works because the story arrives before the request. Once the target accepts the story, the next step can feel like normal cooperation.

The best response is not confrontation. It is verification. Slow the request down, use a trusted channel, and make the process decide whether the story is true.

Share This Page

Send this glossary page to a teammate, client, or employee who needs a quick explanation.

FAQ

Questions Teams Ask About Pretexting

Quick answers about false stories, identity verification, business workflows, and social engineering risk.

What is pretexting?

Pretexting is a social engineering tactic where an attacker creates a false identity, role, or situation to make a request seem legitimate.

How is pretexting different from phishing?

Phishing is often the delivery method, such as an email or text. Pretexting is the story behind the request, such as pretending to be HR, IT, a vendor, or a customer.

Why is pretexting effective?

It gives the target a believable reason to cooperate. The attacker uses context, authority, timing, and normal business language to lower suspicion.

How can employees respond to possible pretexting?

They should verify the person, the request, and the channel before sharing information, changing accounts, approving payments, or bypassing a process.