vishing phishing cybersecurity

Watch Out for Vishing!

This year, the celebration of Cybersecurity Awareness Month (CAM) focuses on establishing a secure behavior by following four simple steps – using strong passwords and a password manager, deploying MFA wherever possible, keeping software constantly updated, and recognizing and reporting phishing attempts. Many organizations train employees to spot phishing emails, but few raise awareness of vishing phone scams.

Phishing vs. Vishing

Most people are familiar with the term phishing, but not everyone knows about vishing. It is a type of fraudulent activity that falls under the general phishing category and aims to achieve the same objectives. Phishing and vishing share a common objective, which is to obtain valuable information from users that can be exploited for identity theft, financial gain, or unauthorized account access. But unlike phishing, which primarily conduct email-based attacks, vishers mainly use voice as the main tool for deception, leveraging voice-altering software, text messages, social engineering, and fraudulent phone numbers to trick users into revealing sensitive information. Smishing, on the other hand, is another form of phishing that utilizes SMS text messages to target users. It is often used in conjunction with voice calls, depending on the attacker’s methods.

Phishing and vishing share a common objective, which is to obtain valuable information from users that can be exploited for identity theft, financial gain, or unauthorized account access. However, the key distinction between the two tactics lies in the way they are executed to target potential victims. Phishing is primarily an email-based attack, while vishing involves the use of voice, typically through calls to a user’s cell phone number.

How do vishers operate?

Phishing attackers often send numerous email messages to a list of potential targets. In general, phishers use compelling email messages to trick users into replying with sensitive information or convince them to click a link where malware is hosted. Additionally, malicious attachments are also often used in some phishing attacks.

Vishing attackers typically use two methods to deceive their victims. The first method involves sending a text message to large quantities of potential victims from a long list of phone numbers. The message may ask the user to call the attacker’s number. The second method is to create an automated message and use robo-dialing to contact potential victims. Computer-generated voice messages without any accent are used to gain trust. The voice message then tricks the user into connecting to a human agent who carries on with the scam, or it might ask the user to open a website controlled by the attacker.

When a cybercriminal gets someone on the phone, they use various social engineering techniques to appeal to the victim’s basic human instincts of trust, fear, greed, and desire to help. The criminal may use one or all of these methods to convince the victim that they are doing the right thing, depending on the vishing scheme.

For example, scammers may impersonate an employee’s wife, asking the HR department to get hold of the employee’s phone number urgently. Another typical example is pretending to be a grandkid, asking their grandparent for money to help in a difficult situation.

Scammers are primarily financially motivated. They will use all their “charm” to convince their victims to divulge bank account information or credit card details. They may even ask the victim to take action by transferring funds, emailing confidential work-related documents, or providing details about their employer.

How to prevent vishing attacks

A vishing attempt is an attack that requires time. The scammer needs to gain the victim’s trust or need to amplify emotions of fear or greed to convince them to take the next step.

However, awareness of this social engineering method is the most essential step to preventing vishing. Organizations must educate users to help them recognize vishing attacks and report them. In addition, individuals should be cautious of giving out personal information to someone who contacts them via text or voice calls. Any legitimate institution will provide a primary number to call, enabling you to verify that the call is official before sharing any sensitive details.

Another way to protect ourselves against vishing is to think rationally and identify when someone is trying to play with our emotions by inserting pressure. The best way of doing this is to pause, think about the conversation, and then act. Remember that banks will never ask you to disclose any financial data. And if the scammer pretends to be your son or daughter, you can always call them back to check the story’s validity.

Finally, a reasonable precaution is to ignore calls or messages from unknown numbers and block these calls on your mobile phone. If the scammer employs sophisticated tactics like spoofing the caller ID, never give any sensitive information regardless of where the caller claims to work.

This October, keep yourself cyber-safe – stay updated, stay alert, and stay aware.

Happy Cybersecurity Awareness Month!

Latest posts by Jason Keenaghan (see all)
Scroll to Top