Spoofing ist das Vortäuschen einer falschen Identität, häufig im Rahmen krimineller Tätigkeiten. In der IT kann dies z. B. durch E-Mails geschehen, die angeblich von vertrauenswürdigen Absendern stammen. Der Begriff leitet sich ab vom englischen Verb „spoof“, zu Deutsch täuschen, beschwindeln.
Spoofing ist ein Vorgehen, das für unterschiedliche kriminelle Aktivitäten genutzt wird. Zu den möglicherweise vorgetäuschten vertrauenswürdigen Identitäten gehören:
Durch das Vortäuschen einer solchen vertrauenswürdigen Identität können Nutzer u. a. dazu gebracht werden:
Potentiell begegnet es Ihnen bei jeder E-Mail und in jedem Link, der für Sie nicht klar lesbar ist. Auch am Telefon kann Spoofing betrieben werden, z. B. indem sich ein Anrufer als Ihr Administrator ausgibt und Sie nach Ihrem Passwort fragt.
Ganz allgemein: Verringern Sie Ihre Cyberrisiken. Dadurch verringern Sie auch die Erfolgsaussichten eines Spoofings. Konkret:
Spoofing refers to impersonating a false identity, often in the context of criminal activities. In IT, this can occur, for example, through emails that appear to come from trusted senders. The term is derived from the English verb “to spoof,” meaning to deceive or trick.
Spoofing is a technique used in various criminal activities. Some of the trusted identities that may be impersonated include:
Your bank
Well-known companies such as Amazon, eBay, or PayPal
The police or other government agencies
One of your service providers, customers, or even your CEO
Friends, acquaintances, or family members
By pretending to be one of these trusted sources, attackers can manipulate users into:
Visiting compromised websites that install malware on their computers
Disclosing usernames, passwords, or even banking details by entering them into a fake website
Revealing sensitive company information or transferring large sums of money (e.g., CEO fraud)
Opening email attachments that contain malicious software, such as keyloggers or ransomware
Responding to extortion attempts, e.g., from an alleged IT expert who claims to have observed and recorded compromising activities, demanding payment to avoid public exposure
Spoofing can appear in any email or link that seems unclear or suspicious. It can also occur over the phone, where a caller pretends to be your administrator and asks for your password.
Generally: Reduce your overall cyber risk—this lowers the chances of a successful spoofing attack. Specifically:
Treat emails with skepticism. If anything seems suspicious, verify the sender’s identity outside of your email program—for example, by calling them directly or visiting their website. Do not use contact details provided in the suspicious email—use information from your address book or official channels.
Raise awareness among all employees, including admins, executives, and board members. A short verification call can prevent serious damage.
Never click on links in emails to access a customer account. Instead, manually visit the website and log in as usual. Often, „urgent“ invoices or fake security notices will turn out to be bogus.
Check the actual destination of any link before clicking. If you’re unsure, don’t click it—navigate to the page manually.
Report extortion attempts to the authorities. Even if they seem absurd or inappropriate, they are criminal offenses.
Kontaktieren Sie uns.
Unser Team ist für Sie da!
Telefon: +49 30 95 999 8080
E-Mail: info@perseus.de
© 2025 Perseus Technologies GmbH. All rights reserved