The power of vishing: Why it’s effective and how to avoid falling victim


Thanks to the efforts of employers and banks, most of us are familiar with the term phishing. We know if something sounds too good to be true, it probably is – and we’ve sat through training and received the warning emails from our employers, banks and other organizations we interact with on a regular basis to be aware of cyber scam attempts, and read through emails and messages with a critical eye.
Cybercriminals, however, never rest – and as long as there is someone out there who can potentially fall victim, they will keep up their efforts. Vishing – which aims to achieve the same objectives as phishing – uses voice-altering software, phone calls and social engineering to trick users in to revealing sensitive information. Many organizations train employees to spot phishing emails, but fewer raise awareness of vishing phone scams – and in a world where more and more of our everyday communications take place via written messages as opposed to phone calls, vishing attempts capitalize on the ability of a skilled fraudster to manipulate and socially engineer a victim.
Identity and Access Management Expert at Thales.
Anatomy of a scam
Phishing attacks generally work via sending huge amounts of email messages to lists of potential targets. By impersonating genuine email messages, or bringing in a sense of urgency or concern, phishers aim to trick users into replying, or click a link where malware is hosted.
Vishing attackers, meanwhile, typically use two strategies to trick their targets. One way is sending out text messages to a lengthy list of phone numbers – perhaps acquired legitimately, or purchased from other cybercriminals – asking users to call the attacker’s number or requesting other details. Another strategy involves dialing through the list of numbers using software and playing an automated voice message. This may ask the victim to go to a website under an attacker’s control, or they may deceive the victim into connecting with a human scammer, who can continue the conversation and persuade them to share bank details, transfer funds, or other kinds of harmful actions.
Once a cybercriminal has gained access to a victim during a call , they can employ a variety of social engineering strategies to play on the victim’s innate trust, fear, greed, and desire to assist. While the intentions may vary from one scheme to another, fundamentally the criminal is aiming to persuade the victim that they are acting morally.
A scammer could, for example, call claiming to be from a victim’s bank and request details as part of a claimed fraud investigation. Or they could pose as an employee’s spouse, call their employer and request that the HR division immediately obtain the worker’s phone number. Another common instance is when someone poses as a grandchild and approaches their grandparents for financial assistance at a trying time.
Financial gain is the primary motivation of scammers. They will seek ways to make the victim feel like they need to act immediately, so they have no moment to think, ask the advice of someone else, or change their mind. Short of physically breaking into a premises or IT infrastructure themselves, calling and manipulating a victim can be a highly effective way to get them to send money, email sensitive data, or give information out about their company.
Stay situationally aware
Vishing takes time to persuade and build trust. Scammers need to prey on the fallibilities we all have as human beings in order to distract and encourage unthinking action. Using time pressure is another common tactic, Overall, organizations should be clear with their employees around what vishing attacks look like, and encourage reporting and critical thinking. Everyone should be cautious of sharing personal information in response to unsolicited contact. Anyone legitimate who is getting in touch will provide evidence to help users verify it is genuine before sharing any sensitive details, such as providing a primary number to call – banks for example will never call or send messages without verifying themselves using other sources first.
Individuals should also practice the same critical thinking and situational awareness as they would with phishing attempts in combating vishing threats. Take a moment, think about the conversation, and don’t feel rushed to act. Banks and other financial providers, for example, will never request any kind of financial information from you. Additionally, you can always follow up with the person concerned if a scammer pretends to be someone else, like a close family member, work colleague or manager.
Finally, screening and blocking calls and messages from unknown numbers on your phone are reasonable precautions. Scammers will always keep trying in a world where they can automate attacks, and the potential payoff can be so great – but by staying aware and practicing a good level of critical thinking, users can protect both themselves and the organization they work for.
We’ve featured the best online cybersecurity courses.
This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro
Thanks to the efforts of employers and banks, most of us are familiar with the term phishing. We know if something sounds too good to be true, it probably is – and we’ve sat through training and received the warning emails from our employers, banks and other organizations we interact…
Recent Posts
- Here’s when and where you can preorder the new iPhone 16E
- The Humane AI Pin debacle is a reminder that AI alone doesn’t make a compelling product
- This 1.9-pound smartphone’s massive battery offers six months of standby
- Movie sales – including 4K Blu-ray – fell again last year, but if you’re going streaming only, you’re massively missing out
- A new and dangerous keylogger is on the loose – here’s how to stay safe
Archives
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010