
Introduction
Phishing is the buzzword in everyone’s mouth. As the most common method of cyber-threat, it’s a way of playing on victims’ emotions to coerce them into disclosing sensitive data.
While over 90% of cyberattacks begin with a phishing email, that is not the only way that phishers reach out to their victims. Since our digital messages have expanded far beyond our electronic inboxes, so too have phishers found other avenues for reaching out to victims and extorting money and personal information from them.
Have you ever received a voice phishing call? Also known as vishing, this threat takes place over a phone call instead.
Behind Vishing Calls
Let’s follow a typical scenario of how a vishing call might unfold.
First, the scammer makes initial contact. They often use a spoofed number to make the call appear to come from a legitimate source, such as a bank, government agency, or tech support.
So, the caller might introduce themselves as a representative from the spoofed organization. They might use personal information they already have about the victim (like their name or address) to build trust. Then, they start putting on the pressure. For example, they might claim that there’s been suspicious activity on the victim’s bank account, or that the victim owes money to the IRS and legal action will be taken if they don’t comply immediately. Legal and financial trouble are strong motivators that make people forget their cybersecurity best practices!
The threat actor will use your trust and concern to get you to provide sensitive information, such as your Social Security number, bank account details, or login credentials. They might also ask the victim to make a payment or transfer money. Once the scammer has whatever information they need, they can use it to commit identity theft, access the victim’s accounts, or carry out further fraudulent activities.
How to Protect Yourself From Voice Phishing
Have you ever encountered a suspicious call like this? If so, you need to know what to do in sticky situations! Consider the following steps.
- Verify the caller. If you receive an unsolicited call, hang up and contact the organization directly using a known, official number.
- Be skeptical of any caller who creates a sense of urgency or asks for sensitive information.
- Don’t share personal information. Never give out personal or financial information over the phone unless you are certain of the caller’s identity.
Artificial intelligence can create audio that sounds like an exact replica of somebody’s voice, down to the words and intonations, in a threat known as deepfaking. It’s important to contact the purported person or organization through validated, encrypted channels.
When Has Vishing Actually Occurred?
You may experience vishing more than you realize! When tax season comes and the fake IRS calls about you owing thousands, you have to remember that the real government sends official documents via snail mail and ask you to log in through secure portals. If election season rolls around with hundreds of robocalls asking for fake political donations, you know what to do.
Vishing also attacks larger organizations. Voice phishing targeted at just one employee can impact the entire company, just like any other social engineering scam.
In December 2024, authorities in Spain and Peru dismantled a sophisticated vishing ring that had defrauded over 10,000 victims. The criminals used caller ID spoofing and social engineering scripts to trick victims into revealing sensitive banking information.
Law enforcement conducted 29 raids, arresting 83 individuals and seizing cash, computers, and documents. The incident demonstrates how large voice phishing operations can become, as well as the importance of international cooperation in fighting all cybercrime!
Conclusion
Voice phishing is just one of many cyber-threats out there today. The more you know about how these threats are perpetuated, the better you can protect yourself and your data.
No one should ask you for sensitive information over the phone. Legitimate organizations and government departments will direct you through legitimate, encrypted channels. If someone puts you under pressure, that’s exactly the time to slow down and assess the situation.
Whether you receive a vishing call, another kind of phishing scam, or any other cyber-threat, education is power in detecting and responding to threats of all kinds. The more you know, the quicker you can report and evade devastating incidents like these!
The post Vishing: What Makes Voice Phishing So Effectively Dangerous? appeared first on .