May 2026

Skimming, Spoofing & Social Engineering: Common Identity Theft Tactics

When we think about identity theft, we often imagine high-tech hackers breaching massive databases. But many identity thieves rely on simpler, sneakier tactics to gather personal information – right under your nose. Three of the most common techniques used today are skimming, spoofing and social engineering.

Understanding how these schemes work can help you stay one step ahead and protect your information more effectively.

What is skimming?

Skimming is a method of stealing credit or debit card information using a small device that reads the magnetic stripe. These skimmers are often placed on ATMs, gas station pumps or even handheld point-of-sale devices at restaurants. When you swipe your card, the device captures your card number and stores it for the thief to retrieve later.

Thieves may also install small cameras or fake keypads to record your PIN as you enter it. Together, this information allows them to create a duplicate card and use it without your knowledge.

How to protect yourself from skimming:

  • Use ATMs in well-lit, secure locations, preferably inside a bank.
  • Tug on the card reader before inserting your card. If it feels loose, don’t use it.
  • Cover the keypad when entering your PIN.
  • Use contactless payment methods when possible.

What is spoofing?

Spoofing involves disguising communication to make it appear as if it’s coming from a trusted source. This could be a phone call from your bank’s phone number, an email that looks like it’s from your boss or a fake website designed to look like a real login page.

The goal of spoofing is to gain your trust – and your personal information – so the scammer can either commit fraud or gain access to accounts. It’s a tactic often used within phishing attacks to increase success rates.

How to spot spoofing attempts:

  • Be wary of unexpected phone calls asking for personal information, even if the caller ID looks familiar.
  • Double-check email addresses – even a single letter off is a red flag.
  • Don’t click links in unsolicited emails or texts. Go directly to the official website.

What is social engineering?

Social engineering is the art of manipulating people into revealing confidential information. These scams play on emotions, such as fear, urgency, sympathy or even greed, to bypass your critical thinking. Examples include fake tech support calls, charity scams after disasters or someone pretending to be a coworker needing urgent help.

Social engineering often combines elements of phishing and spoofing to seem more convincing.

  • Slow down. Scammers rely on you acting quickly before you think.
  • Verify requests through another trusted method. For example, call a coworker directly if you get a strange email from them.
  • Be skeptical of urgent financial requests or “emergencies” involving wire transfers or gift cards.

Final thoughts

Skimming, spoofing and social engineering are powerful tools in a fraudster’s toolkit. But with awareness and caution, you can avoid falling for these tactics. Trust your instincts – if something feels off, it probably is. When in doubt, verify independently and never share sensitive information unless you’re absolutely sure whom you’re talking to.

Need to report card fraud? Call 800-647-2328, option 4, or text 318-549-8145, M-F 8:30 am – 5 pm.

After hours debit card fraud: Call 866-274-2761.

After hours credit card fraud: Call 800-543-5073.