Skip to main content
Vishing

How to Build Rapport in Vishing

When you hear the word “rapport,” what do you think of? It often involves actions like mirroring the other person’s body language and offering a warm smile, which can significantly enhance your connection. What if you had to build rapport without seeing the other person? That’s the case with vishing. Vishing (voice phishing) is a common vector in social engineering attacks. Also, ethical social engineers use vishing as part of their testing and training programs. Let’s see how rapport can be built during vishing.

How to build rapport in vishing

Tone

The tone of voice in phone conversations is crucial as it conveys emotions that words alone cannot. Unlike face-to-face interactions, where body language and facial expressions provide additional context, phone conversations rely heavily on vocal cues. While an indifferent tone can create tension, smiling gently can result in a warm and friendly tone that conveys confidence. This can put the person on the receiving end at ease and help to lower their guard.

Liking

Liking is one of Robert Cialdini’s six principles of influence, it states that people are much more likely to be influenced and persuaded by those that they like, than those that they don’t. Simply put, people like people that are like them. A social engineer may use this principle of influence to build rapport by finding things in common with the intended target thus leading the other person to believe they are like them. This must be done in a subtle way so as not to sound as if you’re mocking the other person. Finding genuine commonalities always works best than made up ones.

Tribe

According to Psycologytoday.com “tribalism refers to humans forming social groups and identifying with them, driven by shared identity, values, and goals.” Building rapport through the concept of a tribe involves creating connections based on these things. Social engineers use this principle on vishing calls when impersonating a colleague of the same company. Through OSINT found, they can also mention specific industry jargon or terminology used by a corporation thus making themselves part of the same tribe.

Actively Listening

Establishing rapport through active listening is a powerful way to build trust. Active listening involves not just hearing the words being spoken but also understanding the underlying emotions of what’s being said. This means avoiding interruptions and providing cues that you are engaged. Doing this validates the speaker’s experience, making them feel valued and understood, which in turn fosters a sense of rapport.

Ethical Social Engineers

The principes stated above are only a few of the techniques used by social engineers to establish rapport. With Social-Engineer’s Managed Vishing Service, all of our vishing calls are performed by our certified, ethical social engineers. This provides a realistic learning environment as they can pivot and adjust their conversations like real attackers. They employ the same techniques as malicious attackers. However, one thing sets them apart, empathy. Our motto at Social-Engineer, LLC is “leave them better for having met you.” Thus, we never use extreme fear or negative pretexts that would embarrass or demoralize the employees we test. Our goal is to test, educate, and protect, while leaving you feeling better for having met us.

Written by
Rosa Rowles
Human Risk Analyst

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.