What’s the difference between phishing and pretexting?
Phishing: Push-based attacks
Phishing attacks human nature as opposed to technical security weaknesses. Attackers use emails, SMS (smishing), social media messages, and other mass communication, often sending thousands of identical or slightly personalized emails, hoping for even the smallest click rate. One-touch interactions are the order of the day: click here, enter credentials there, download this. Done.
Classic phishing examples include:
-
Fake password reset emails from "IT"
-
Bogus shipping notifications with malicious tracking links
-
Urgent suspended account messages
-
Invoice emails with malware-laden attachments
Attackers don't need to know much about you. Generic social pressure tactics work fine when targeting thousands. One fake Microsoft login page can collect 100+ credentials in a couple of hours, if worded right, with no need for roleplay, pretext, or other emotional manipulation.
Pretexting: Pulling you into a back-and-forth interaction
For a detailed look at pretexting fundamentals, check out our guide: What is Pretexting in Cybersecurity.
Pretexting requires a strong narrative (“pretext”) and specific roles to deceive victims. Attackers research their targets, companies, and organizational structures to craft believable scenarios that coax victims into parting with credentials, wire transfer information, and sensitive data.
These attacks are overwhelmingly financially motivated, 95% according to Verizon, with pretexting/BEC accounting for 24–25% of financially motivated incidents over the past two years. Pretexting almost always involves multiple interactions:
Day 1: Call from someone claiming to represent a benefits provider, referencing your department or manager.
Day 2: Follow-up email asks you to confirm your employee ID.
Day 3: Callback requests your system login to “link accounts.”
Compare this to phishing: One email. One malicious link. One credential harvesting page. The entire attack lifecycle happens in under five minutes. In fact, the median time to fall for phishing is less than 60 seconds, with 21 seconds to click and 28 seconds to enter credentials. Pretexting takes days and multiple touchpoints, each building on the last.
Multi-touch vs. one-touch: How the attacks differ
|
Feature |
Phishing |
Pretexting |
|
Interaction |
One-touch |
Multi-touch |
|
Timing |
Seconds |
Days or weeks |
|
Personalization |
Low |
High |
|
Goal |
Credentials, clicks |
Credentials, payments, system access |