BlogDefence22ND SEP 2023
AuthorSamir Yawar
5 min read
Defence

What is Vishing: 4 Ways Voice Phishing is a Real Threat

Twitter
Facebook
WhatsApp
Email
LinkedIn
a feature image about vishing
BlogDefence22ND SEP 2023
5 min read
Defence

What is Vishing: 4 Ways Voice Phishing is a Real Threat

AuthorSamir Yawar
Twitter
Facebook
WhatsApp
Email
LinkedIn
a feature image about vishing

Ever heard of the expression that a fool and his money are soon parted? While this phrase may have been coined in the 16th century, it remains as relevant as ever. To understand this, we need to learn about what is vishing.

Last year, Amanda Law of Stoney Creek, Ontario, was contacted by someone claiming to be from her bank. The person on the other end of the telephone had so much information on Amanda that she thought the call was legitimate. Law told CTV News that she was persuaded to give the caller her bank details after he told her that her account had been hacked and she needed to act immediately by transferring her money.

That day, Amanda lost $12,000 to a vishing scam.

What is Vishing?

Vishing, also known as voice phishing, is a cybercrime that relies on impersonating people or organizations over phone calls to gain access to privileged information. This technique is used to target individuals as well as organizations.

Today, we will help you understand how this scam works and what you can do to avoid falling victim to it. We will also look at four ways fraudsters use vishing to get what they want.


To convince their victims, cybercriminals use elaborate social engineering tactics designed to give up the information they want. With that information, they can empty bank accounts, steal your social media identity, and much more.

How can a vishing attack work against an organization?

A vishing attack begins with a scammer impersonating an employee of an organization. They can then call on the CEO’s behalf, ordering the victim to pay funds. The criminal can request money in various ways. It could be for an outstanding invoice or even an emergency funds request transfer.

How can a vishing attempt work against an individual?

Cybercriminals who use vishing rely on a mixture of persuasion techniques and threats to corner their victims. The target believes they have no choice but to do what the scammer at the other end of the phone says.

TrueCaller estimates about 33% Americans fell victim to vishing in 2022.

Top Vishing Techniques in use

Social engineers continue to develop the most elaborate ways to trap their targets over the phone. We'll look at the four most common vishing methods today.

Don't forget to hover over the cards to see more information:

Wardialing

Wardialing is a technique where automated software dials a range of phone numbers to identify vulnerable or unsecure lines. It helps attackers find potential targets for unauthorized access or exploitation.

VoIP Phishing

This is a type of cyber attack where scammers use Voice over Internet Protocol (VoIP) technology to deceive individuals into revealing sensitive information, often by impersonating trusted organizations or individuals over phone calls.

Dumpster Diving

Dumpster diving refers to searching for valuable or confidential information through trash or discarded materials. Attackers may engage in dumpster diving to obtain discarded documents, such as invoices or financial statements, which can be used for identity theft or other malicious purposes.

Caller ID Spoofing

Caller ID spoofing is a technique scammers use to manipulate or falsify the information displayed on the recipient's caller ID. By spoofing their phone number, attackers can make it appear as if the call is coming from a different number or a trusted entity, deceiving the recipient into answering the call or revealing sensitive information.

How to Prevent a Vishing Scam?

Phishing can be controlled with modern technological countermeasures. However, the same can’t be said for vishing. Because it involves a phone call, most organizations are not equipped with the means to listen to calls or the ethical concerns that come with it.

To counter this problem, some countries have made it mandatory for telecom companies to implement an industry-standard anti-spam call technology. One of these examples include the STIR/SHAKEN framework, which can authenticate and validate VoIP voice calls. These measures make it easy to report and block vishing calls.

In the absence of such measures, most vishing attacks can be nipped in the bud by following some simple rules:

Conclusion

You have learned about what is vishing and its destructive potential at the hands of con artists. Given how much we rely on phone conversations on a day-to-day basis, it is crucial to remain vigilant, recognize red flags, and avoid disclosing personal information that can be used by a visher to steal your identity and commit fraud.

Resources to Download

How to defeat voice phishing scams? Follow these rules:

A list of rules to prevent vishing scams

Here are some important things to do if you believe a visher has approached you:

Fallen victim to a vishing scam? This checklist mentions the steps you should take to protect yourself from voice phishing.


Samir Yawar
Samir Yawar / Content Lead
Samir wants a world where people can instinctively whack online scams and feel accomplished without the need for psychic powers. As an ISC2 member, he is doing his bit to turn cybersecurity awareness training into a fun concept with simple, approachable and accessible content. Reach out to him at X @yawarsamir
FAQsFrequently Asked Questions
Vishing scammers manipulate caller IDs using Voice over Internet Protocol (VoIP) technology to display fake phone numbers or disguise their identity by appearing as a trusted entity.
Voice modulation is a technique used by vishing scammers to alter their voice pitch, tone, or accent, making it difficult for victims to recognize their true identity and increasing the credibility of their fraudulent calls.
Tracing vishing attacks can be challenging as scammers often employ anonymization techniques, such as using virtual private networks (VPNs) or disposable phone numbers, to hide their true location and identity.
Various technologies, such as voice biometrics and call analytics, are available to detect vishing attempts. These tools analyze call patterns, voice characteristics, and other factors to identify suspicious or fraudulent calls.
Organizations can implement measures such as employee training on vishing awareness, adopting call verification protocols, monitoring and analyzing call traffic for anomalies, and implementing strict authentication procedures to mitigate the risk of vishing attacks.