Email phishing has reigned as the top internet crime since 2019, with over 320,000 victims last year, according to the “FBI’s 2021 Internet Crime Report” [1]. The concept of email phishing is not new; however, the rate of these crimes continues to increase.
To combat this threat, large investments are being made in technical mitigations. However, the underlying problem is human nature. In the technical arena, training activities often focus on what, rather than why. Perhaps helping users understand why they are susceptible to certain phishing solicitation techniques may help reduce the underlying threat.
Reviewing contemporary literature, we find that the psychology of phishing is an area of active research. In this literature, I found a few interesting points:
- User demographics can play an important part as to which types of phishing emails users may be susceptible to, and thus trainings may need to be tailored per demographic [2][3][4]
- Email volume can play a factor into a user’s likelihood of failing a phishing attack [2].
- If phishing emails are rare, a user may have an increased likelihood of failing the phishing attack [3].
With regard to demographics, many papers use Cialdini categories of persuasion to describe the types of phishing emails which users may be more susceptible to [4][5]. These categories, first described in Cialdini’s book Influence: The Psychology of Persuasion, are listed below:
- Scarcity
- Authority
- Commitment
- Liking
- Perceptual contrast
- Reciprocation
- Social proof
Now let’s consider how these persuasion techniques could be used in a phishing attack.
Scarcity could be used to indicate that only a small quantity of a desirable reward exists and that a user needs to act quickly to receive the award. Consider an email that asks a user to respond immediately or they could miss out on a desirable item, such as a free gift.
Authority could be used by falsely claiming to be with a government group and that a nonresponse could result in a penalty. Consider an email which claims to be from the government and the user must respond or be threatened with jail time.
Commitment could be used by claiming that the user had previously made an agreement and they must fulfill their agreement. Consider an email which claims that a user had previously signed up for a service and thus a response is required.
Liking uses an existing favorable relationship. Consider an email which uses the false identity of a known friend to attempt to lower a user’s suspicion.
Perceptual contrast uses multiple messages to make a user more susceptible to a later message. Consider some new event in the news and, subsequently, an email which presents a solution to the news item.
Reciprocation could be seen as a need to fulfill repayment for a good or service received. Consider an email which claims a user needs to do something in repayment.
Social proof takes advantage of a user’s desire to be part of a group or tribe. Consider an email which claims that most people in a group do a certain action.
We each have our own personal biases based on our background and life experiences. Understanding the techniques of influence which an adversary may use can perhaps help us from falling into their phishing traps.
Additional Posts by Contributor
- Federal Bureau of Investigation, “Internet Crime Report 2021,” . Available: ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf.
- S. Kleitman, M. K. H. Law and J. Kay, “It’s the Deceiver and the Receiver: Individual Differences in Phishing Susceptibility and False Positives With Item Profiling,” PLoS ONE, Vol. 13, Issue 10, .
- D. M. Sarno and M. B. Neider, “So Many Phish, So Little Time: Exploring Email Task Factors and Phishing Susceptibility,” Human Factors, .
- Cybersecurity & Infrastructure Security Agency, “Official Alerts and Statements - FBI” Available: cisa.gov/stopransomware/official-alerts-statements-fbi.
- Y. Hanoch and S. Wood, “The Scams Among Us: Who Falls Prey and Why,” Current Directions in Psychological Science, Vol. 30, Issue 3, , pp. 260–266.
- D. Oliveira, H. Rocha, H. Yang, D. Ellis, S. Dommaraju, M. Muradoglu, D. Weir, A. Soliman, T. Lin, and N. Ebner, “Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing,” CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, .
- N. C. Ebner, D. M. Ellis, T. Lin, H. A. Rocha, H. Yang, S. Dommaraju, A. Soliman, D. L. Woodard, G. R. Turner, R. N. Spreng, and D. S. Oliveira, “Uncovering Susceptibility Risk to Online Deception in Aging,” The Journals of Gerentology: Series B, Vol. 75, Issue 3, p. 522-533.
Contribute to the conversation
We want to hear from you. Send us your questions, thoughts on ICS and OT cybersecurity, and ideas for what we should discuss next.