{"id":19395,"date":"2021-12-08T14:02:50","date_gmt":"2021-12-08T14:02:50","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=19395"},"modified":"2023-04-27T15:23:48","modified_gmt":"2023-04-27T15:23:48","slug":"what-is-an-impersonation-attack","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/","title":{"rendered":"What is an Impersonation Attack?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A <strong>user<\/strong><\/span><b>&nbsp;impersonation attack<\/b><span style=\"font-weight: 400;\"> is a type of fraud where an attacker poses as a trusted person to steal money or sensitive information from a company. Usually, these types of attacks come from individuals targeting high-level executives. The goal of these bad actors is to transfer money into a fraudulent account, share sensitive data, or reveal login information to hack a company\u2019s network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, <strong>what&#8217;s an impersonation attack?<\/strong>&nbsp;<\/span>Let&#8217;s dive in and learn more.<\/p>\n<h2><b>How Does an Impersonation Attack Work?<\/b><\/h2>\n<p><b>Impersonation attacks <\/b><span style=\"font-weight: 400;\">don\u2019t involve malware and often happen through email. Hackers use social engineering to gather information about a targeted employee. In addition, they conduct extensive research on their target through social media and other sources. This information helps give the attacker credibility and makes their message seem authentic.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Usually, the targeted person is an employee who can transfer funds or has access to proprietary information. The attackers then use this data to create fake emails that appear to originate from high-level executives. They\u2019re designed to trick the victim into transferring money or sensitive information.<\/span><\/p>\n<h2><b>What is an Impersonation Attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It\u2019s hard to detect this kind of attack because most of the time, users don\u2019t pay close attention to detail, or they&#8217;re unaware of this type of threat. Unfortunately, this lack of awareness is one of the reasons why many security breaches happen. Here\u2019s an email&nbsp;<strong>impersonation attack example<\/strong><\/span><span style=\"font-weight: 400;\">&nbsp;and how similar it can look to the real thing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">oorayys@impersemail.com<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">oorayys@impersemal.com<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It can be challenging to tell the difference between emails that are this similar, especially if you\u2019re busy with many work tasks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Modern phishing attacks like this are very targeted, making them harder to detect. Spear phishing attacks are usually well-designed and can deceive users into thinking they\u2019re receiving a legitimate email.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unlike general phishing attempts, an&nbsp;<\/span><b>impersonation attack<\/b><span style=\"font-weight: 400;\">&nbsp;doesn\u2019t have spelling and grammar errors. Having grammatically correct emails makes them appear more authentic to the recipient. However, there are signs that can help you recognize this scam.&nbsp;<\/span><\/p>\n<h3><b>An Urgent Tone<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Assailants of these attacks try to compel victims to act immediately, without thinking. They do this by adding pressure through urgent language. This behavior increases their chances of succeeding.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since user<\/span><b>&nbsp;impersonation attacks<\/b><span style=\"font-weight: 400;\"> usually look like they\u2019re coming from company executives, the messages will sometimes threaten negative consequences if they don\u2019t complete the task. Remember, attackers don\u2019t want you to analyze what you\u2019re doing.<\/span><\/p>\n<h3><b>Unusual Requests<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Always be on the lookout for emails that ask for sensitive information. You must verify their authenticity before sharing private documents or transferring money.&nbsp;<\/span><\/p>\n<p><b>An impersonation attack<\/b><span style=\"font-weight: 400;\">&nbsp;usually involves sending funds to unusual accounts or requesting recipients to provide personal information such as bank account numbers. Multiple channels should corroborate a request to transfer money or share sensitive information.<\/span><\/p>\n<h3><b>Emphasis On Confidentiality<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">When they\u2019re trying to get sensitive information, attackers will usually emphasize terms such as \u201cconfidential,\u201d \u201cprivate,\u201d or \u201csecret.\u201d They use these terms in an attempt to prevent you from telling others about the email. Since privacy is an essential element, this tactic usually works.&nbsp;<\/span><\/p>\n<h3><b>Incorrect Email Addresses and Links<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">S<\/span><span style=\"font-weight: 400;\">cammers are good at using an email address similar to the correct one to appear legitimate. Always look at the actual address URL by hovering over it, or if you\u2019re using a mobile device, by pressing and holding. Pay close attention to ensure that everything has correct spelling before you reply.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reply-to address may differ from the address the email was sent from, so check this as well. In addition, sometimes, a link in an email is fake. Make sure the links within the email match the text from the hyperlinks in the email copy.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These tips won\u2019t work against someone who has hacked someone else\u2019s email, so always look for other signs that the person is being impersonated.<\/span><\/p>\n<h2><strong>How to Prevent an Impersonation Attack?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Organizations should implement a multi-layered approach to secure emails and prevent cybercrime and phishing attacks. Here are some techniques organizations can use to <strong>prevent an<\/strong>&nbsp;<\/span><b>impersonation attack<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<h3><b>Email Security Solutions<\/b><\/h3>\n<p>An <b>impersonation attack<\/b><span style=\"font-weight: 400;\">&nbsp;can get past regular <a href=\"https:\/\/easydmarc.com\/blog\/what-is-spam-email-and-how-to-prevent-it\/\">email spam<\/a> filters and expose sensitive information without requiring special permissions. Many companies have developed software to help protect against these sophisticated attacks.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, <a href=\"https:\/\/www.itransition.com\/machine-learning\/fraud-detection\">machine learning-based threat detection<\/a> identifies emails that contain suspicious content and flags them for potential security threats.<\/span><\/p>\n<h3><b>Cybersecurity Training<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Your employees are another defense mechanism against<\/span><b> impersonation attacks<\/b><span style=\"font-weight: 400;\">, but they can be the opposite if they aren\u2019t trained correctly in spotting the correct information. By equipping employees with the necessary knowledge to detect these scams, you can promote a security culture and stay ahead of attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s also essential to have regular training because scammers constantly update their techniques to deceive their targets.<\/span><\/p>\n<h3><b>A Company Domain<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using a specific email domain instead of a generic one for your company enhances protection against impersonation attacks. Generic email domains like Yahoo and Gmail are easier to impersonate, making it simpler for scammers to get into your inbox and extract sensitive information.<\/span><\/p>\n<h3><b>Standard Operating Procedures<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A set of comprehensive email procedures can help minimize the likelihood of an employee accidentally falling victim to an <\/span><b>impersonation attack<\/b><span style=\"font-weight: 400;\">. For instance, you can mandate that all email requests be verified internally before transferring funds or sending sensitive data.<\/span><\/p>\n<h2><b>What To Do About An Impersonation Attack<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When employees suspect they were the target of an <\/span><b>email impersonation scam<\/b><span style=\"font-weight: 400;\">, they should immediately inform their supervisor, the IT department, and the individual who the attacker impersonated. In addition, various government agencies can help prevent cybercrime and help with the aftermath of these attacks.<\/span><\/p>\n<h2><b>The Takeaway<\/b><\/h2>\n<p><b>Email impersonation attacks<\/b><span style=\"font-weight: 400;\"> are a <a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\">common phishing scam<\/a> used to gain funds or obtain sensitive information illegally. These types of attacks will continue to be a method cybercriminals use, so it\u2019s essential to recognize them whether through an unusual request, urgent tone, incorrect email address, or emphasis on secrecy.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most importantly, you need to take steps to protect against such threats. So, pay attention to details, get some cybersecurity training, use a company domain, and create email procedures. Doing these things will help keep you, your company, your money, and your private information safe from bad actors.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A user&nbsp;impersonation attack is a type of fraud &#8230;<\/p>\n","protected":false},"author":5,"featured_media":19396,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-19395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is an Impersonation Attack? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an Impersonation Attack?\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-08T14:02:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-27T15:23:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"What is an Impersonation Attack?\",\"datePublished\":\"2021-12-08T14:02:50+00:00\",\"dateModified\":\"2023-04-27T15:23:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/\"},\"wordCount\":1073,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/06.12_003.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/\",\"name\":\"What is an Impersonation Attack? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/06.12_003.jpg\",\"datePublished\":\"2021-12-08T14:02:50+00:00\",\"dateModified\":\"2023-04-27T15:23:48+00:00\",\"description\":\"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/06.12_003.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/06.12_003.jpg\",\"width\":1440,\"height\":910,\"caption\":\"06.12 003\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-an-impersonation-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"What is an Impersonation Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is an Impersonation Attack? | EasyDMARC","description":"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is an Impersonation Attack?","og_description":"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.","og_url":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-12-08T14:02:50+00:00","article_modified_time":"2023-04-27T15:23:48+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"What is an Impersonation Attack?","datePublished":"2021-12-08T14:02:50+00:00","dateModified":"2023-04-27T15:23:48+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/"},"wordCount":1073,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/","url":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/","name":"What is an Impersonation Attack? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","datePublished":"2021-12-08T14:02:50+00:00","dateModified":"2023-04-27T15:23:48+00:00","description":"Cybercriminals always lurk around the internet for personal details. Once they gather enough, impersonation attacks are unavoidable.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","width":1440,"height":910,"caption":"06.12 003"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-an-impersonation-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"What is an Impersonation Attack?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/12\/06.12_003.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=19395"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/19396"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=19395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=19395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=19395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}