The Psychology Behind Phishing

Cognitive biases are inherent mental shortcuts that enable efficient decision-making, but they can also result in significant errors in judgment, particularly in high-stress situations like phishing attacks. These biases stem from our brain's need to conserve cognitive energy, often leading us to rely on instinct rather than careful analysis. This article explores how cognitive biases—grouped into categories such as "Too Much Information" and "Not Enough Meaning"—can make individuals more susceptible to manipulation by cybercriminals. By examining ten common biases exploited in phishing attempts, such as the Availability Heuristic and Authority Bias, and analyzing several case studies, we gain insights into how emotions are weaponized against victims. Ultimately, understanding these psychological tactics allows organizations to implement better cybersecurity measures while also leveraging cognitive biases for positive outcomes, turning potential vulnerabilities into tools for enhancing decision-making and protection against cyber threats.
Written by
Joshua Crumbaugh
Published on
September 10, 2024

4.1 Understanding Cognitive Biases

Cognitive biases are mental shortcuts that our brains use to make decision-making more efficient, but they can also lead to errors in judgment. These biases often arise because our brains are trying to process large amounts of information quickly, using patterns and assumptions to simplify complex situations. While these mental shortcuts can be helpful in everyday life, they can also make us more vulnerable to manipulation, especially in phishing attacks and other social engineering tactics.


Cognitive biases exist because our brains are wired to conserve cognitive energy and make quick decisions. However, this speed sometimes comes at the cost of accuracy. In stressful or high-pressure situations, like receiving an alarming email or phone call, these biases can make us more likely to fall for scams because we rely on instinct rather than careful analysis.


Cognitive biases can be grouped into four main categories:


  1. Too Much Information
    Our brains are constantly bombarded with information, so we filter out what seems unnecessary and focus on the most noticeable or relevant details. This can lead to overemphasizing certain data while ignoring the bigger picture.
  2. Not Enough Meaning
    In uncertain or ambiguous situations, we tend to fill in gaps with assumptions and patterns that may not exist. This can cause us to draw incorrect conclusions based on incomplete information.
  3. The Need to Act Quickly
    When faced with urgent situations, we often make fast decisions to resolve problems quickly. However, this need for speed can lead to impulsive actions that aren’t fully thought through.
  4. What We Should Remember
    Our memories aren’t perfect, and we tend to focus on information that seems important or emotionally relevant. This can result in us remembering things inaccurately, especially under stress.

Here are 10 common cognitive biases that phishing attackers exploit:


  1. Availability Heuristic
    People are more likely to react to information that comes easily to mind, especially after hearing about recent events, such as cyberattacks.
  2. Anchoring Bias
    People tend to rely too heavily on the first piece of information they receive, such as an initial alarming message about a supposed account breach.
  3. Negativity Bias
    Negative information, like warnings of account suspension or threats of data loss, tends to weigh more heavily on decisions than positive information.
  4. Framing Effect
    The way information is presented—whether positive or negative—can influence decisions, such as presenting an action as “protecting your account.”
  5. Confirmation Bias
    People tend to favor information that confirms their preexisting beliefs. Phishers exploit this by sending messages that align with the target’s concerns, like fake security alerts.
  6. Authority Bias
    Requests from perceived authority figures, like executives or IT departments, are more likely to be followed without question.
  7. Scarcity Bias
    Limited-time offers or threats of expiring access play on people’s fear of missing out, prompting impulsive actions like clicking malicious links.
  8. Social Proof
    Messages that imply “everyone else is doing this” can manipulate individuals into complying with fake instructions, such as updating security settings.
  9. Omission Bias
    Phishers suggest that inaction will lead to worse consequences than taking an action, making individuals feel pressured to respond.
  10. Empathy Gap
    When in a heightened emotional state, like fear or stress, people may not predict how they will act, which attackers use to create urgency or panic.

See our Cognitive Bias Index for more complete information on cognitive biases.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

4.2 The Role of Cognitive Biases in Everyday Decision Making

Cognitive biases are integral to how we process information and make decisions, often allowing us to act quickly and efficiently. However, while these mental shortcuts can sometimes lead to poor judgment or manipulation, they can also be harnessed for good. In fact, “social engineering for good” uses the same cognitive biases that attackers exploit to help individuals and organizations make better decisions, especially in high-stakes environments like cybersecurity.


For example, the availability heuristic causes people to focus on recent or easily recalled events. Cybersecurity training programs can use this to their advantage by frequently reminding employees about the dangers of phishing attacks, keeping the threat top of mind and making individuals more vigilant when suspicious emails appear.


Similarly, confirmation bias, which leads people to favor information that supports their beliefs, can be leveraged to reinforce positive behaviors. Regularly exposing employees to stories and examples of strong security practices can make them more likely to seek out and believe in the importance of safe online habits.


Anchoring bias can also be used defensively. By initially framing cybersecurity policies or instructions as critical, businesses can ensure that employees view these guidelines as non-negotiable. This establishes a solid foundation where security is a priority, and any deviation from it feels like a significant departure.


Negativity bias, which makes us focus more on negative outcomes, can be harnessed to drive better behavior as well. For example, cybersecurity training that emphasizes the severe consequences of a data breach—loss of sensitive information, financial penalties, reputational damage—can motivate individuals to be more cautious with their online actions, knowing what’s at stake.


In some cases, social proof, a bias where people look to others for behavioral cues, can also be an ally. Creating a culture of security, where employees see their peers adopting good practices like using strong passwords or reporting phishing emails, can encourage widespread adoption of secure behaviors. If everyone around you is practicing good security hygiene, you’re more likely to follow suit.


By understanding these biases and deliberately designing security programs that align with how people naturally think, organizations can build a stronger defense against cyber threats. Cognitive biases, often seen as vulnerabilities, can become powerful tools for fostering good decision-making and preventing attacks.


In a way, social engineering for good takes the tactics of attackers and turns them around to protect individuals. Rather than manipulating people to fall for scams, these tactics are used to empower them to stay safe online, reinforcing positive behaviors and making the right security decisions second nature.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

4.3 How Emotions Are Weaponized Against You

How Emotions Are Weaponized Against You


Cybercriminals know that emotions are a powerful tool for manipulation, and they weaponize them to exploit vulnerabilities in their targets. Phishing attacks, scams, and social engineering tactics often rely on triggering emotional responses—fear, urgency, curiosity, or even empathy—to bypass rational thinking and provoke impulsive decisions.


For example, fear is commonly used to drive action. A phishing email might claim that your account has been compromised or that you’re at risk of losing access unless you act immediately. By inducing panic, attackers can lower your defenses and make you more likely to click on a malicious link or provide personal information without verifying the source.


Urgency is another emotion frequently exploited. Messages designed to create a sense of limited time—such as warnings about missed payments or expiring benefits—push you into making snap decisions. When feeling pressured, it’s easy to overlook potential red flags or forget to double-check the authenticity of the message.


Attackers also play on empathy and trust. Business Email Compromise (BEC) scams, for instance, often involve impersonating someone the target knows and trusts, like a colleague or executive, and requesting urgent help. The natural desire to assist someone in need can override skepticism, leading to dangerous actions like transferring money or sharing sensitive information.


In many cases, attackers combine several emotional triggers to create a potent mix of fear, urgency, and trust. This emotional manipulation bypasses logical decision-making, making victims act before they’ve had time to fully consider the consequences.


By understanding how emotions can be weaponized against you, it becomes easier to recognize and resist these tactics, making you less vulnerable to manipulation and better equipped to protect yourself from phishing and other cyber threats.


Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon

4.4 Case Studies: Phishing and Psychological Manipulation

Case Studies: Phishing and Psychological Manipulation

Phishing scams often trick people by playing with their emotions and instincts. These scams can be very clever, making it hard to see through them. This chapter looks at real-life examples to show how phishing works and what we can learn from these attacks.


Case Study 1: The Ubiquiti Networks AttackBackground: In 2015, Ubiquiti Networks, a tech company, was tricked by a phishing attack.
Incident: Criminals sent fake emails pretending to be from the company’s top bosses. These emails were very believable and asked the finance team to send a lot of money to foreign bank accounts for urgent and secret reasons. The finance team followed the instructions and sent about $46.7 million before realizing it was a scam.
Psychological Tricks:

  • Trust in Authority: The emails looked like they came from top bosses, so employees didn’t question them.
  • Urgency: The emails said it was urgent, making employees act quickly without thinking.
  • Secrecy: Mentioning that it was confidential made employees less likely to check with others.

Outcome and Lessons: Ubiquiti got back about $8.1 million, but the incident taught them to have better email security and to double-check important requests.

Case Study 2: The FACC CEO FraudBackground: In 2016, FACC, an Austrian aerospace company, was hit by a phishing scam targeting their financial team.
Incident: Scammers pretended to be the CEO and asked an employee to transfer €50 million to a foreign bank account. The email was convincing, so the employee didn’t check with the actual CEO and sent the money.
Psychological Tricks:

  • Pressure: The email made it seem like the transfer had to happen quickly.
  • Believability: The scammers knew how the company worked and made the email look real.
  • Trust in Authority: Employees tend to trust and follow instructions from higher-ups.

Outcome and Lessons: Only about €10 million was recovered, and both the CEO and CFO were fired. The company learned the importance of having checks in place for large money transfers.

Case Study 3: The Target Data BreachBackground: In 2013, Target’s customer data was stolen starting with a phishing email to one of its vendors.
Incident: Scammers sent an email to employees at Fazio Mechanical, a company that worked with Target. The email had a bad attachment that, when opened, installed malware. This malware spread to Target’s network and allowed thieves to steal credit card information from millions of customers.
Psychological Tricks:

  • Trust: The email came from a known contact, so employees were less cautious.
  • Curiosity: People often open attachments that look interesting or important.
  • Lack of Verification: The employees didn’t double-check the email’s origin before opening the attachment.

Outcome and Lessons: Target faced huge costs over $200 million. This incident highlighted the need for strong security measures with third-party vendors and being careful with email attachments.

Case Study 4: The Sony Pictures HackBackground: In 2014, Sony Pictures was hacked due to a phishing email sent to a high-level employee.
Incident: Hackers, believed to be from North Korea, sent an email with a bad link to a Sony executive. When the link was clicked, malware was installed, which stole a lot of sensitive data like unreleased movies and private employee information.
Psychological Tricks:

  • Curiosity: The email made the executive interested enough to click the link.
  • Trust in Familiar Email: The email looked like it was from a trusted source.
  • Confusion and Distraction: The hacker’s message may have seemed urgent or important enough to cloud judgment.

Outcome and Lessons: The hack caused severe damage to Sony, affecting its reputation and finances. This case showed the importance of educating employees about phishing and being careful with any unexpected emails or links.

Conclusion: These cases show how phishing relies on fooling people through trust, urgency, and other psychological tricks. Understanding these tactics can help individuals and organizations spot and stop phishing attempts. Training, awareness, and careful checking are key to staying safe from phishing.

Get Free Security Awareness Posters!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon
Meet The Social Engineer

Joshua Crumbaugh

Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
Integration iconIntegration iconIntegration icon