Households & Business

The Influence Stack: How Scammers Use Persuasion Psychology Against You

Published May 22, 2026 · 8 min read · By the ScamDrill Team
FIELD GUIDE · MAY 2026 The Influence Stack. Scammers don’t use one trick. They stack several at once. one message Authority Urgency Scarcity Social proof Liking Reciprocity Commitment FTC · 2024 $12.5B US fraud losses HARVARD · 2024 54% click AI phishing ScamDrill scamdrill.com/blog

There is a comforting story we tell about scam victims, and it goes like this: they were careless, or greedy, or simply not paying attention. It is comforting because it implies the rest of us are safe. It is also wrong. The people who lost a combined $12.5 billion to fraud in 2024, according to the US Federal Trade Commission, were not unusually foolish. They were busy, distracted, hopeful, or under pressure — ordinary human states — at the exact moment a message arrived that was engineered to exploit them.

What makes a scam work is not a clever lie. It is a precise understanding of how human decisions get made, and which mental shortcuts can be triggered on demand. The psychologist Robert Cialdini spent decades cataloguing these shortcuts, and his principles of influence — authority, scarcity, social proof, liking, reciprocity, commitment, and unity — have since become required reading on both sides of the fight. Marketers use them to sell. Scammers use them to steal. The difference is not the toolkit; it is the intent.

$12.5B → $15.9B US consumers reported $12.5 billion in fraud losses to the FTC in 2024, a 25 percent jump in a single year. By the agency’s 2025 tally, that figure had climbed to a record $15.9 billion. Imposter scams — the ones that lean hardest on the psychology below — accounted for nearly $3 billion of the 2024 total across some 850,000 reports.
Source: FTC Consumer Sentinel Network data, reported March 2025 and 2025 annual figures

Influence isn’t a trick. It’s a shortcut you can’t turn off

Your brain handles thousands of micro-decisions a day, and it cannot afford to deliberate over each one. So it leans on rules of thumb. If a message comes from someone in authority, comply. If something is scarce, want it more. If everyone else is doing it, it is probably safe. These shortcuts are not defects. They are what let a person function in a world too complex to analyze from scratch every morning. Cialdini’s insight was that because the shortcuts are automatic, they can be tripped by anyone who knows the trigger — including someone who has manufactured a fake version of the cue.

That is the uncomfortable core of the whole subject. You cannot simply decide to stop responding to authority or urgency, any more than you can decide to stop flinching at a loud noise. Recent academic work bears this out. A 2024 study at Harvard Kennedy School found that phishing emails written entirely by AI achieved a 54 percent click-through rate — statistically on par with messages crafted by human social-engineering experts, and roughly 350 percent more effective than a generic control message. The participants were not unintelligent. The persuasion was just well-built.

Content analyses of real phishing campaigns published between 2023 and 2025 point in the same direction. When researchers code which of Cialdini’s principles appear in a message, authority and scarcity show up most often, and liking and authority turn out to be the strongest predictors of whether a target actually takes the bait. None of this is intuitive from inside the moment. That is the point.

Seven levers, two uses. The same shortcut that helps you every day is the one a scam imitates. EVERYDAY VERSION WEAPONIZED VERSION Authority we defer to experts A trusted manager’s call “This is the IRS or your bank” Scarcity & urgency A real sale ending Sunday “Your account locks in 24 hours” Social proof we copy the crowd Real reviews, a full room Fake reviews, “others invested” Liking we say yes to friends A warm, familiar colleague A flattering stranger or “match” Reciprocity we repay favors A genuine favor returned A “refund” before the real ask Commitment & consistency Following through on a goal A tiny first step that escalates Unity we trust our group A real shared community “A fellow veteran” or “neighbor” ScamDrill scamdrill.com/blog
Framework: Cialdini’s principles of influence. Weaponized examples drawn from FTC and FBI IC3 scam reporting, 2023–2026.

The real weapon is the stack, not the single trick

Most explanations of scam psychology stop at the list above, as if a scammer picks one principle off the shelf and runs with it. The list is useful, but it is also the part everyone already half-knows. Here is the part that matters more and gets discussed less: real scams almost never use one principle. They use four or five at once, layered into a single message so the cues reinforce each other. Researchers coding live phishing campaigns routinely find multiple principles co-occurring in the same email, and the reason is simple — pressure compounds. Authority on its own can be questioned. Authority plus a deadline plus the sense that everyone else has already complied is much harder to step outside of.

Consider an ordinary bank-impersonation text, the kind that topped the FTC’s list of reported text scams in 2024, and read it the way a scammer designed it:

One text, four levers. A single 30-word message, reverse-engineered. SMS · +1 (840) 22… Wells Fargo Fraud Dept: A $1,294.00 charge to a NEW device was just approved on your account. If this wasn’t you, verify now — account locks in 30 minutes. Reply 1 to speak with an agent. AUTHORITY A bank’s “fraud department” PLAUSIBILITY Exact figure, “new device” URGENCY A 30-minute countdown COMMITMENT “Reply 1” — one small yes Each cue is weak alone. Together they push you to act before the analytical part of your brain catches up. ScamDrill scamdrill.com/blog
An illustrative reconstruction of a common bank-impersonation smishing text. Reply “1” and a live operator takes over to walk you through “securing” the account.

The genius of that message is not any single line. It is the layering. The sender name borrows authority. The precise dollar amount and the phrase “new device” supply plausibility and a jolt of fear. The countdown manufactures urgency. And “reply 1” extracts a tiny commitment — once you have answered, you are in a conversation, and consistency pressure makes the next request feel like a natural continuation rather than a fresh decision you could refuse. By the time a real person is on the line, three or four shortcuts are firing simultaneously, which is exactly what they were chosen to do. This is the same architecture behind the AI-driven impersonation covered in our neo-phishing guide and the cloned-voice calls in our AI voice-cloning guide.

“Authority on its own can be questioned. Authority plus a deadline plus the sense that everyone else complied is much harder to step outside of.”

The traits being exploited are the ones you’d want in a colleague

Here is the perspective that tends to land hardest. The instincts a scam preys on are not weaknesses you should feel embarrassed about. They are, in most contexts, virtues. Deference to authority is what keeps an organization functioning; nobody wants the employee who treats every instruction from the finance director as a potential trap. A bias toward helping is what makes someone a good neighbor and a decent coworker. Consistency — following through on what you have started — is the backbone of trustworthiness. Scammers do not target the worst in us. They target the parts of us that the rest of life rewards.

That reframing matters for two reasons. First, it dissolves the shame that keeps victims silent, and silence is the scammer’s most reliable ally; the FTC and FBI both estimate that the large majority of fraud goes unreported. Second, it explains why “just be more skeptical” is such weak advice. You cannot run your whole life in interrogation mode without becoming impossible to work or live with. The realistic goal is not permanent suspicion. It is learning to recognize the specific texture of a stacked influence attempt — and to install one reliable circuit-breaker. Our breakdown of the wider anatomy of a modern scam shows where this persuasion sits inside the broader criminal supply chain, and our look at social engineering against small businesses covers the workplace version up close.

Slow scams stack the same levers — just over months

Fast scams compress the stack into thirty words. Slow scams stretch it across a relationship. Romance and so-called “pig-butchering” investment scams are the clearest example, and they lean overwhelmingly on liking, reciprocity, and commitment. Research published in 2025 in the Journal of Cybersecurity describes the playbook in clinical detail: weeks of warmth and constant contact build genuine attachment (liking), small confided secrets and gifts create a sense of mutual obligation (reciprocity), and then a first tiny investment is allowed to “pay out” a fake profit. That first small step is the hinge. Once a victim has put in a little and seen it grow, the sunk-cost fallacy takes over, and every subsequent transfer feels consistent with a decision they have already made. Pulling out would mean admitting the earlier steps were a mistake — so they keep going.

The mechanics are identical to the bank text; only the clock is different. If you are worried about someone in this situation, the warning signs and the conversation to have are in our romance-scam guide for families and the deeper pig-butchering breakdown.

How to break the stack

You do not defeat a stacked influence attempt by being smarter than it. You defeat it by changing the conditions it needs to work. Every principle in the stack depends on you staying inside the conversation the scammer controls, on a clock the scammer sets. Remove either of those and the whole structure loses its footing.

The circuit-breaker

When a message makes you feel you must act right now, treat the urgency itself as the red flag — not a detail to act on. Then verify through a separate channel you choose: hang up and call the bank on the number printed on your card, or text the relative on the number already in your phone. Naming the pressure out loud (“this is using a deadline on me”) is enough to switch the analytical part of your brain back on. Legitimate organizations do not lose anything if you take ten minutes to call them back. Scammers lose everything.

The single most useful habit is the out-of-band check, because it neutralizes the entire stack at once rather than each principle in turn. The authority cue cannot survive you dialing the real number. The urgency cannot survive a deliberate pause. The commitment pressure cannot survive a second opinion from someone who is not inside the scammer’s frame. This is also why practice beats theory: in the moment, you will not run down a checklist of seven principles, but you can train the reflex to slow down when something feels engineered to speed you up.

Recognizing the levers is the first half. The second half is rehearsing the response often enough that it fires automatically — the same way the scam does. For a sense of which specific lures are circulating right now, our May 2026 scam-trends roundup tracks what the influence stack is being wrapped around this month.

You can’t un-know a tactic you’ve felt.

ScamDrill sends safe, realistic fake texts, voicemails, and emails — built on the exact persuasion tactics in this article — to your family or team on a rotating schedule. When someone reacts to one, they get a teachable moment instead of a real loss.

Start free →

Frequently asked questions

What is the psychology of influence that scammers use?

Scammers exploit the same mental shortcuts that psychologist Robert Cialdini catalogued as the principles of influence: authority, scarcity and urgency, social proof, liking, reciprocity, commitment and consistency, and unity. These are not flaws — they are efficient rules of thumb that let us make fast decisions in a complicated world. A scam works by triggering these shortcuts deliberately so that a target acts before the slow, analytical part of the brain catches up. Recent content analyses of phishing find that authority and scarcity dominate, while liking and authority are the strongest predictors of whether a message succeeds.

Why do intelligent people still fall for scams?

Falling for a scam has very little to do with intelligence and almost everything to do with context. The persuasion principles scammers use are universal and largely automatic, and they work best when a person is busy, stressed, tired, or emotionally invested — states that have nothing to do with IQ. The traits that make someone a reliable employee or a caring family member, such as deference to authority and a desire to help, are exactly the traits a scam targets. A 2024 Harvard Kennedy School study found that AI-generated phishing emails reached a 54 percent click-through rate, on par with messages written by human experts, which shows how effective well-built persuasion is even on careful readers.

What is the single best defense against persuasion-based scams?

Verify the request through a separate, trusted channel before you act, and give yourself permission to be slow. Almost every persuasion-driven scam depends on you staying inside the conversation the scammer controls and acting on a clock you did not set. Hanging up and calling the organization back on a number you look up yourself, or texting a relative on a number you already have, breaks the spell because it interrupts the urgency and removes the scammer’s ability to keep stacking pressure.

How do romance and pig-butchering scams use influence differently?

Fast scams stack persuasion principles into a single message, but slow scams stack them over weeks or months. Romance and pig-butchering scams lean heavily on liking, reciprocity, and especially commitment and consistency: small early investments that pay out fake profits make the victim feel committed, and the sunk-cost fallacy then makes withdrawing feel like a loss. Research published in 2025 describes this as a deliberate fatten-then-butcher escalation, where each step the victim takes is engineered to make the next one feel consistent with choices they have already made.

Join our free newsletter to stay ahead of the scammers

Receive updates on monthly scam trends, along with best practices to protect yourself and those you care about.