Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity GuidesPhishing Guide
Pretexting

Pretexting vs. Phishing: Social Engineering Tactics Explained

Last Updated:
March 3, 2026

Key Takeaways:

  • Pretexting vs phishing comes down to interaction style. Phishing is a fast, one-touch attack, while pretexting unfolds through targeted, multi-step conversations.

  • Pretexting causes far higher financial losses because attackers invest time, research, and real-time manipulation to steal money or access.

  • Huntress helps organizations stay ahead of both tactics with Managed Security Awareness Training (SAT) and Managed Identity Threat Detection and Response (ITDR) to catch compromised identities before damage escalates.

Pretexting and phishing both aim to steal your credentials, your money, and your data, but the methods these attackers use are quite different. The key difference is that phishing is "push-based," while pretexting is all about the "conversation style" of human interaction. To compare pretexting vs phishing, think of it this way: phishing casts a wide net with one-touch attacks, while pretexting targets people through multi-step conversations. 

According to the FBI's 2024 Internet Crime Complaint Center report, Business Email Compromise (BEC) attacks, which often rely on pretexting, caused $2.77 billion in losses across 21,442 incidents. Meanwhile, phishing accounted for 193,407 complaints. Verizon’s 2024 Data Breach Investigations Report (DBIR) shows pretexting now makes up more than 40% of social engineering incidents, surpassing phishing among breach actions.

Try Huntress for Free
Get a Free Demo
Topics
Pretexting vs. Phishing: Social Engineering Tactics Explained
Down arrow
Topics
  1. Types of Phishing Attacks You Should Be Aware of
  2. Statistics on Phishing Attacks
  3. Don’t Get Caught! How to Prevent Phishing in Business
  4. Credential Harvesting Phishing: How Attackers Steal Login Credentials?
  5. How to Spot a Phishing Email: Key Red Flags to Watch For
  6. Spoofing vs. Phishing: Understanding the Key Differences
  7. Spear Phishing: How Targeted Attacks Bypass Traditional Defenses
  8. Phishing Risk Assessment: How to Evaluate and Reduce Your Exposure?
  9. Whaling vs. Spear Phishing: How Cybercriminals Target Executives and Organizations?
  10. How to Create an Effective Incident Response Plan for a Phishing Attack
  11. Indicators of a Phishing Attempt: How to Detect and Avoid Scams
  12. Man-in-the-Middle Phishing Attacks: How Hackers Intercept Sensitive Information
  13. Best Phishing Protection Solutions
  14. Supply Chain Phishing: How Attackers Exploit Vendor Relationships?
  15. The Phishing Red Flags Your Employees Need to Know
  16. SMS Phishing (Smishing) Attacks: How to Recognize and Prevent Them?
  17. Pretexting vs. Phishing: Social Engineering Tactics Explained
    • What’s the difference between phishing and pretexting?
    • Warning signs to watch for
    • Defending against both: Strategies that work
    • Real-world examples of pretexting and phishing
    • What’s another name for pretexting?
    • Common pretexting and phishing scams
    • The legal consequences of pretexting and phishing
    • Pretexting vs. pharming: One more comparison
    • After credentials are compromised, what’s next?
  18. Spear Phishing vs. Phishing: Why Every Attack Feels Targeted
Share
Facebook iconTwitter X iconLinkedin iconDownload icon

Pretexting vs. Phishing: Social Engineering Tactics Explained

Last Updated:
March 3, 2026

Key Takeaways:

  • Pretexting vs phishing comes down to interaction style. Phishing is a fast, one-touch attack, while pretexting unfolds through targeted, multi-step conversations.

  • Pretexting causes far higher financial losses because attackers invest time, research, and real-time manipulation to steal money or access.

  • Huntress helps organizations stay ahead of both tactics with Managed Security Awareness Training (SAT) and Managed Identity Threat Detection and Response (ITDR) to catch compromised identities before damage escalates.

Pretexting and phishing both aim to steal your credentials, your money, and your data, but the methods these attackers use are quite different. The key difference is that phishing is "push-based," while pretexting is all about the "conversation style" of human interaction. To compare pretexting vs phishing, think of it this way: phishing casts a wide net with one-touch attacks, while pretexting targets people through multi-step conversations. 

According to the FBI's 2024 Internet Crime Complaint Center report, Business Email Compromise (BEC) attacks, which often rely on pretexting, caused $2.77 billion in losses across 21,442 incidents. Meanwhile, phishing accounted for 193,407 complaints. Verizon’s 2024 Data Breach Investigations Report (DBIR) shows pretexting now makes up more than 40% of social engineering incidents, surpassing phishing among breach actions.

Try Huntress for Free
Get a Free Demo

What’s the difference between phishing and pretexting?

Phishing: Push-based attacks

Phishing attacks human nature as opposed to technical security weaknesses. Attackers use emails, SMS (smishing), social media messages, and other mass communication, often sending thousands of identical or slightly personalized emails, hoping for even the smallest click rate. One-touch interactions are the order of the day: click here, enter credentials there, download this. Done.

Classic phishing examples include:

  • Fake password reset emails from "IT" 

  • Bogus shipping notifications with malicious tracking links

  • Urgent suspended account messages

  • Invoice emails with malware-laden attachments

Attackers don't need to know much about you. Generic social pressure tactics work fine when targeting thousands. One fake Microsoft login page can collect 100+ credentials in a couple of hours, if worded right, with no need for roleplay, pretext, or other emotional manipulation.


Pretexting: Pulling you into a back-and-forth interaction

For a detailed look at pretexting fundamentals, check out our guide: What is Pretexting in Cybersecurity.


Pretexting requires a strong narrative (“pretext”) and specific roles to deceive victims. Attackers research their targets, companies, and organizational structures to craft believable scenarios that coax victims into parting with credentials, wire transfer information, and sensitive data. 

These attacks are overwhelmingly financially motivated, 95% according to Verizon, with pretexting/BEC accounting for 24–25% of financially motivated incidents over the past two years. Pretexting almost always involves multiple interactions:

Day 1: Call from someone claiming to represent a benefits provider, referencing your department or manager.

Day 2: Follow-up email asks you to confirm your employee ID.

Day 3: Callback requests your system login to “link accounts.”

Compare this to phishing: One email. One malicious link. One credential harvesting page. The entire attack lifecycle happens in under five minutes. In fact, the median time to fall for phishing is less than 60 seconds, with 21 seconds to click and 28 seconds to enter credentials. Pretexting takes days and multiple touchpoints, each building on the last.  

Multi-touch vs. one-touch: How the attacks differ

Feature

Phishing

Pretexting

Interaction

One-touch

Multi-touch

Timing

Seconds

Days or weeks

Personalization

Low

High

Goal

Credentials, clicks

Credentials, payments, system access



Warning signs to watch for

Phishing attacks

  • Generic greetings ("Customer") vs your name

  • Suspicious sender addresses (amaz0n.com, not amazon.com)

  • Urgent language to push you past thinking

  • Unexpected attachments or links

  • Grammar errors and awkward phrasing (though AI is making these less common)

Pretexting attacks

  • Out-of-band requests (IT asking for your password on the phone)

  • Unusual timing (calls about "urgent" issues after hours)

  • "Can't share details in email" disclaimers

  • Resistance to standard verification procedures

  • Knowledge of internal company details to build credibility

  • Requests that sidestep normal approval processes


Defending against both: Strategies that work

Callback verification

If you receive a phone call from someone claiming to be from IT, your bank, or any other company, hang up and call back using a verified number, not the one they give you.

Dual approval processes

Critical functions like wire transfers, password resets, or access changes require dual approval. This protects against both pretexting and phishing.

Scenario-based training

Employees need to recognize both the instant phishing email red flags and the slow-burn manipulation tactics of pretexting. Regular, scenario-based training helps internalize a "pause and verify" mindset. This matters because humans contribute to 68% of breaches.




Real-world examples of pretexting and phishing

High-profile phishing attacks

In July 2020, attackers successfully phished Twitter employees to gain access to internal systems, then hijacked high-profile accounts, including Barack Obama, Elon Musk, Joe Biden, and Apple Inc.'s company account. They posted Bitcoin scam messages to millions of followers, though they only collected about $117,000.

Devastating pretexting incidents

MGM Resorts (2023): The Scattered Spider group called MGM's IT help desk, impersonated an employee using information from LinkedIn, and convinced staff to reset credentials. The 10-day attack cost MGM $100 million in lost revenue as slot machines went offline, digital room keys stopped working, and hotel operations reverted to pen and paper. No malicious email. No attachment. Just one very convincing phone call.


Caesars Entertainment (2023): When the same group targeted Caesars, the company chose a different path than MGM. Attackers used social engineering on an outsourced IT vendor to access the loyalty program database containing Social Security numbers and driver's licenses. Caesars paid a $15 million ransom (negotiated down from $30 million) to prevent data release. The attack began weeks before MGM's, proving that pretexters often study multiple targets simultaneously.


What’s another name for pretexting?

Some call pretexting “pretexing,” “social engineering through impersonation,” or a modern “confidence trick.” Some in the industry also refer to it as "pretext calling" if it's done over the phone. With AI voice cloning and deepfakes, pretexters now have tools that make impersonation a lot more convincing and harder to detect.


Curious about the other types of phishing? We’ve got you covered in our guide.




Common pretexting and phishing scams

Pretexting-heavy scams:

  • Tech support scams (fake IT staff)

  • IRS/Government impersonation (threats of arrest) 

  • Romance scams (fake relationships before money requests)

  • Job offer scams (fake recruitment fees for "background checks" or "training materials")

  • Grandparent scams (elderly exploitation)

Phishing-dominant scams:

  • Account update scams (fake bank messages)

  • Business email compromise (combines both tactics)

  • Cryptocurrency scams (fake investment opportunities)


Together, phishing and pretexting via email account for 73% of social engineering breaches. The FBI reported $16.6 billion in total cybercrime losses in 2024, with 83% from cyber-enabled fraud like phishing and pretexting.


The legal consequences of pretexting and phishing

Both tactics are illegal under federal law. The Gramm-Leach-Bliley Act (1999) makes it a federal crime to use pretexting to obtain personal financial information under false pretenses. Congress passed the Telephone Records and Privacy Protection Act (2006) in response to the Hewlett-Packard pretexting scandal, which criminalizes obtaining telephone records through deception.

Regulators may penalize organizations that lack proper security controls, while attackers face criminal charges, including wire fraud, identity theft, and computer fraud, with penalties ranging from substantial fines to decades in prison. 



Pretexting vs. pharming: One more comparison

What’s different between phishing and pharming? Pharming is the technical sibling to phishing and pretexting in the social engineering family. DNS hijacking or host file poisoning redirects users from legitimate websites to attacker-controlled ones, even if users type in the correct URL. It requires more technical skill than pretexting or phishing, but less emotional manipulation.



After credentials are compromised, what’s next?

Understanding the difference between pretexting vs phishing is step one. Step two? Having identity-focused detection when credentials are compromised.

Humans have bad days, and attackers improve. When that happens, you need Huntress Managed ITDR (Identity Threat Detection and Response). Combined with Managed Security Awareness Training (SAT), Huntress brings layered defense to the identity gap. Our training prevents credential theft, and our Managed ITDR detects when attackers try to use those stolen credentials. Book a demo to learn how Huntress protects organizations from both fast phishing attacks and the slow-burning pretext.



Continue Reading

Spear Phishing vs. Phishing: Why Every Attack Feels Targeted

Right arrow

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy