π€ AI Summary
This study addresses the susceptibility of email systems to deception attacks stemming from inherent design and interface conventions, a vulnerability inadequately addressed by existing research due to the absence of a systematic technical taxonomy. To bridge this gap, the authors present the first structured inventory of email deception techniques, organized along four dimensions: sender identity, hyperlinks, attachment security indicators, and email rendering environments. Through a systematic literature review, reverse engineering, and empirical replication, they identify 42 distinct deception techniques and demonstrate 64 concrete implementations. By decoupling high-level adversarial objectives from low-level implementation mechanisms, this work establishes a modular classification framework that serves as a standardized foundation for improving email client design, strengthening defensive architectures, and enhancing user awareness training.
π Abstract
Email remains a central communication medium, yet its long-standing design and interface conventions continue to enable deceptive attacks. This research note presents a structured list of 42 email-based deception techniques, documented with 64 concrete example implementations, organized around the sender, link, and attachment security indicators as well as techniques targeting the email rendering environment. Building on a prior systematic literature review, we consolidate previously reported techniques with newly developed example implementations and introduce novel deception techniques identified through our own examination. Rather than assessing effectiveness or real-world severity, each entry explains the underlying mechanism in isolation, separating the high-level deception goal from its concrete technical implementation. The documented techniques serve as modular building blocks and a structured reference for future work on countermeasures across infrastructure, email client design, and security awareness, supporting researchers as well as developers, operators, and designers working in these areas.