Satan's Phishing Attacks Are More Sophisticated Than Any Email Scam You've Ever Seen
Satan's Phishing Attacks Are More Sophisticated Than Any Email Scam You've Ever Seen
By Mike Olsen | 30-Year Cybersecurity Veteran
In August 2019, Toyota Boshoku Corporation lost $37 million in a single transaction. Their finance team received emails that appeared to come from a senior executive and a trusted vendor. The tone was professional. The requests seemed routine. The money was gone before anyone realized what had happened.
This wasn't a random attack. It was a carefully engineered deception known in cybersecurity as a Business Email Compromise (BEC). The attackers didn't just impersonate one trusted contact. They impersonated two simultaneously, creating a layered deception that perfectly mimicked legitimate business relationships.
The finance team never stood a chance. They had no baseline to compare against. No system to detect when something was off.
Satan uses identical tactics against your spiritual security.
What Is Spiritual Phishing?
In cybersecurity, phishing is the art of impersonating a trusted source to steal something valuable. It works because humans are wired to trust familiar names, professional language, and requests that seem plausible.
Spiritual phishing works the same way. The adversary rarely comes as an obvious threat. He comes as something familiar. Something reasonable. Something that sounds almost right.
Elder David A. Bednar taught that Satan rarely tempts us with obviously evil things. He is far more subtle than that. He works at the edges of our spiritual perception, sending communications that feel legitimate until we examine them carefully against the truth.
The question is: how do you tell the difference between a genuine prompting and a counterfeit one?
The Cybersecurity Solution: Behavioral Modeling
Leading security firms build what are called email identity graphs, which are detailed models of how authentic communication actually looks. They track patterns:
- What time does your CEO normally send emails?
- What language does she typically use?
- What kinds of requests fall within her normal scope?
When something deviates from that established pattern, even slightly, the system flags it. Not because the email looks wrong on the surface. But because it doesn't match the known behavioral baseline.
This is how they catch sophisticated attackers who have done their homework and crafted nearly perfect imitations.
Your Spiritual Behavioral Baseline
The spiritual parallel is profound.
The Holy Ghost communicates in specific, recognizable ways. Peace. Clarity. A still small voice. Confirmation that aligns with scripture and the words of living prophets. Promptings that lead toward Christ, toward covenant keeping, toward light.
When you have spent enough time in genuine spiritual communication, in prayer, in scripture study, in temple worship, you develop a baseline. You know what the real thing feels like.
And when a counterfeit arrives, even a sophisticated one, something doesn't match.
The $37 million deception succeeded because Toyota Boshoku had no behavioral baseline to compare against. They couldn't detect deviation because they hadn't established the standard.
Your daily spiritual practice isn't just devotion. It's building your detection system.
Three Signs of Spiritual Phishing
After 30 years in cybersecurity and a lifetime of spiritual experience, here are the patterns I've learned to watch for:
1. Urgency that bypasses discernment Attackers create artificial urgency: "Wire the funds today or we lose the contract." Satan creates spiritual urgency too, pressuring decisions before you've had time to pray, counsel with trusted advisors, or measure against truth. Genuine spiritual promptings don't require you to bypass the confirmation process.
2. Isolation from trusted sources Sophisticated phishing attacks work to isolate the target from others who might catch the deception. Spiritually, when a thought or influence consistently pulls you away from family, church, scripture, or prayer, that is a behavioral deviation worth examining.
3. The request doesn't match the source's profile God's communications lead toward light, love, covenant, and Christ. When a thought claims divine origin but points toward darkness, secrecy, or separation from God's established order, it doesn't match the behavioral profile of the source it claims to be.
Building Your Detection System
The best defense against phishing, digital or spiritual, is a well-maintained baseline of authentic communication.
Practically, this means:
- Daily scripture study that builds familiarity with God's voice and patterns
- Regular prayer that trains you to recognize genuine promptings
- Temple attendance that deepens your spiritual pattern recognition
- Journaling spiritual experiences so you can review and recognize patterns over time
- Staying close to living prophets whose counsel serves as an authentication key
The adversary is sophisticated. His attacks are personalized, patient, and often nearly perfect in their imitation of the real thing.
But he cannot perfectly replicate what he has never had: the fruits of the Spirit, the peace of Christ, and the confirming witness of the Holy Ghost.
The Promise
As you develop your spiritual behavioral baseline, you will find that deception becomes more obvious, not less. Not because the attacks get simpler, but because your detection system gets stronger.
The same principle that protects the world's most secure networks can protect your spiritual life.
You were not left defenseless in the days of deception. You were given the gift of the Holy Ghost, the words of living prophets, and access to the powers of heaven through covenant.
Use them like the security tools they are.
Mike Olsen is a 30-year cybersecurity veteran and author of Cybersecurity Principles for Spiritual Security: A 12-Week Spiritual Playbook for the Days of Deception. Learn more at CyberSpiritual.com.
Ready to build your complete spiritual security playbook?
Order the book today →