In a paper recently published on arXiv, Maxime Veit, Mattia Mossano, Tobias Länge, and Melanie Volkamer present a structured list of #deception techniques used in emails. The paper describes how sender, link, and attachment information, as well as the #email display environment, can be exploited for deceptive attacks. Building on an earlier systematic literature review, the publication expands the current state of #research with new example implementations and newly identified deception techniques. It serves as a structured #reference for future countermeasures in infrastructure, email client design, and #awareness initiatives, and is aimed at researchers as well as developers, operators, and designers in these fields.
Read the paper: https://doi.org/10.48550/arXiv.2604.04926
@mattiamossano
Comprehensive List of User Deception Techniques in Emails

Email remains a central communication medium, yet its long-standing design and interface conventions continue to enable deceptive attacks. This research note presents a structured list of 42 email-based deception techniques, documented with 64 concrete example implementations, organized around the sender, link, and attachment security indicators as well as techniques targeting the email rendering environment. Building on a prior systematic literature review, we consolidate previously reported techniques with newly developed example implementations and introduce novel deception techniques identified through our own examination. Rather than assessing effectiveness or real-world severity, each entry explains the underlying mechanism in isolation, separating the high-level deception goal from its concrete technical implementation. The documented techniques serve as modular building blocks and a structured reference for future work on countermeasures across infrastructure, email client design, and security awareness, supporting researchers as well as developers, operators, and designers working in these areas.

arXiv.org