{"id":20509,"date":"2022-02-16T15:38:57","date_gmt":"2022-02-16T15:38:57","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=20509"},"modified":"2025-06-26T20:46:26","modified_gmt":"2025-06-26T20:46:26","slug":"what-is-diversion-theft-attack-and-defense-strategies","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/","title":{"rendered":"What is Diversion Theft? Attack and Defense Strategies"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As organizations\u2019 security defenses become more robust, cybercriminals look for ways to use social engineering and exploit the weakest link in the security chain\u2014the human.\u00a0<\/span><\/p>\n<p><b>Diversion theft in social engineering <\/b><span style=\"font-weight: 400;\">is one of the many techniques attackers use to manipulate their victims. Read on to learn more about it, how it works, and prevention tips.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So <\/span><b>what is diversion theft<\/b><span style=\"font-weight: 400;\">?<\/span><\/p>\n<h2><b>What is Diversion Theft?<\/b><\/h2>\n<p><b>Diversion theft is a social engineering<\/b><span style=\"font-weight: 400;\"> technique used to manipulate human psychology. It started as an offline attack, where the thief tricks a courier or delivery company into going to a wrong drop-up or pick-up location.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This type of attack is also known as the \u201cround the corner game\u201d or \u201ccorner game,\u201d and it originated in the East End of London before the introduction of the internet.\u00a0<\/span><\/p>\n<h2><b>How Does Diversion Theft Work?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diversion theft can happen offline or online. Although it\u2019s commonly committed online due to technological advancement, criminals can still execute the attack offline. Regardless, diversion theft means intercepting a transaction.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With offline theft, a van carrying goods can be redirected to a location different from the real address. The attacker will often plant their subordinates at the new location, who then have easy access to the goods, which can be substituted or stolen.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The introduction of the internet has made <\/span><b>diversion theft via social engineering<\/b><span style=\"font-weight: 400;\"> even easier. Scammers work to access information about items you\u2019ve ordered online. This can include the delivery date, address, and the item to be delivered. With this information, attackers pose as the delivery person to supply fake items, then wait to receive the real parcels.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Attackers also use online diversion theft to trick users into sending them information. They utilize social engineering techniques like <\/span><span style=\"font-weight: 400;\">pretexting<\/span><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/phishing-attacks-recognize-and-avoid-email-phishing\/\"><span style=\"font-weight: 400;\">phishing<\/span><\/a><span style=\"font-weight: 400;\"> (including its other types like <\/span><a href=\"https:\/\/easydmarc.com\/blog\/whaling-how-it-works-and-how-to-avoid-it\/\"><span style=\"font-weight: 400;\">whaling<\/span><\/a><span style=\"font-weight: 400;\"> or spear phishing).\u00a0<\/span><\/p>\n<h3><b>Examples of Diversion Theft<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">To effectively counter this attack, it helps to familiarize yourself with <\/span><b>examples of diversion theft<\/b><span style=\"font-weight: 400;\">. The attacker aims to either steal goods and sensitive information or deliver fake or infected goods.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you order a laptop, the attacker can deliver a malware-infected one. This can be a double profit for the scammer\u2014they get a new laptop and can spy on the victim to steal sensitive data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In real life, diversion theft can get quite high-profile. In extreme cases, it can involve pharmaceuticals and high-risk materials, and the actors turn out to be extremists and terrorist organization representatives. That said, individuals and small businesses are still at risk of becoming victims of this social engineering attack.<\/span><\/p>\n<h2><b>Why is Diversion Theft Effective?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diversion theft can only be effective with impactful social engineering techniques. Offline diversion is only successful if it\u2019s convincing. High-profile diversion theft involves a coordinated attack strategy from a group of malicious actors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Online diversion theft is more targeted with enhanced efficacy on a more personal scale. The best way to counter this attack is to understand how social engineers think and what they need from you.<\/span><\/p>\n<h2><b>How to Avoid Diversion Theft<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diversion theft often exploits the human factor to steal goods or access sensitive data. Still, prevention is possible. There\u2019s no single solution but the following tips are vital to mitigate such attacks.\u00a0\u00a0<\/span><\/p>\n<h3><b>Get Confirmation From the Original Source<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">If you get an email from a supposedly legitimate representative asking for sensitive information or to redirect an item to a new location, then something\u2019s up. Ask the proper authority before taking action. Also, the delivery agent should confirm everything with the recipient before releasing the package.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The recipient should also ask for the courier\u2019s ID and contact the organization to verify that the order is the original one.\u00a0<\/span><\/p>\n<h3><b>Educate Your Staff<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Even with the implementation of sophisticated security measures, the human factor can still be manipulated. In \u201c<\/span><span style=\"font-weight: 400;\">The Art of Deception<\/span><span style=\"font-weight: 400;\">,\u201d Kelvin Mitnick mentions that security is merely an illusion, which is intensified through human ignorance and gullibility.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Indeed, <\/span><b>diversion theft is a social engineering<\/b><span style=\"font-weight: 400;\"> technique that can succeed when people are ignorant.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That said, it\u2019s imperative that organizations educate their employees on the different social engineering tactics attackers use to compromise systems and how to avoid them.\u00a0<\/span><\/p>\n<h3><b>Physical Security is Important<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Diversion theft can also happen offline, and attackers can execute it in many ways. An attacker can create a physical diversion to gain access to an organization\u2019s offices and resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like with <\/span><a href=\"https:\/\/easydmarc.com\/blog\/what-is-access-tailgating\/\"><span style=\"font-weight: 400;\">tailgating<\/span><\/a><span style=\"font-weight: 400;\">, protecting your company\u2019s physical space is crucial to prevent diversion theft. While the former is usually more subtle, the latter can cause mass chaos with the goal of obtaining massive amounts of data or causing more damage. With competent security in place, businesses can be much more vigilant about who enters the premises and stop such assaults before they happen.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Diversion theft is a serious issue, especially when gullibility and ignorance come into play. Both individuals and organizations can counter such attacks by staying vigilant, verifying delivery details, and securing their premises.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most importantly, organizations should carry out proper awareness programs to educate their staff on diversion theft and its impact on business continuity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can check our post on social engineering and its types to understand the various attack vectors and how to prevent them.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As organizations\u2019 security defenses become more robust, cybercriminals &#8230;<\/p>\n","protected":false},"author":5,"featured_media":20559,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199,289],"tags":[],"class_list":["post-20509","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Diversion Theft? Attack and Defense Strategies | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Diversion Theft? Attack and Defense Strategies\" \/>\n<meta property=\"og:description\" content=\"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-16T15:38:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T20:46:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1764\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"What is Diversion Theft? Attack and Defense Strategies\",\"datePublished\":\"2022-02-16T15:38:57+00:00\",\"dateModified\":\"2025-06-26T20:46:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/\"},\"wordCount\":874,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/\",\"name\":\"What is Diversion Theft? Attack and Defense Strategies | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg\",\"datePublished\":\"2022-02-16T15:38:57+00:00\",\"dateModified\":\"2025-06-26T20:46:26+00:00\",\"description\":\"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg\",\"width\":2560,\"height\":1764,\"caption\":\"call me fred pPyHkWYSFbk unsplash scaled\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-is-diversion-theft-attack-and-defense-strategies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"What is Diversion Theft? Attack and Defense Strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Diversion Theft? Attack and Defense Strategies | EasyDMARC","description":"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/","og_locale":"en_US","og_type":"article","og_title":"What is Diversion Theft? Attack and Defense Strategies","og_description":"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!","og_url":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-02-16T15:38:57+00:00","article_modified_time":"2025-06-26T20:46:26+00:00","og_image":[{"width":2560,"height":1764,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"What is Diversion Theft? Attack and Defense Strategies","datePublished":"2022-02-16T15:38:57+00:00","dateModified":"2025-06-26T20:46:26+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/"},"wordCount":874,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/","url":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/","name":"What is Diversion Theft? Attack and Defense Strategies | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","datePublished":"2022-02-16T15:38:57+00:00","dateModified":"2025-06-26T20:46:26+00:00","description":"Diversion theft is a social engineering technique used to steal deliveries. It started as an offline trick, but works online too. Learn more!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","width":2560,"height":1764,"caption":"call me fred pPyHkWYSFbk unsplash scaled"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-is-diversion-theft-attack-and-defense-strategies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"What is Diversion Theft? Attack and Defense Strategies"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/02\/call-me-fred-pPyHkWYSFbk-unsplash-scaled.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=20509"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20509\/revisions"}],"predecessor-version":[{"id":48959,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/20509\/revisions\/48959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/20559"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=20509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=20509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=20509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}