Skip to main content
Vishing

Social Engineering News: Vishing

By November 5, 2021No Comments

If an employee falls victim to a vishing attack it could potentially compromise an entire company. As the following statistics show, vishing is a serious social engineering attack vector facing enterprises:

  • In 2021 alone, TrueCaller reports that Americans lost $29,800,000.00 to phone scams.
  • As reported by First Orion, phone scammers were able to get 270% more personal information in 2020 than they did in 2019.

What Is Vishing?

At Social-Engineer, LLC we define vishing as the practice of eliciting information or attempting to influence action via the telephone. Criminals often combine vishing attacks together with phishing emails to create an enhanced sense of legitimacy for the target.

Social Engineering News VishingImage: https://unsplash.com/@austindistel

The following social engineering news stories show how criminals are vishing for victims.

  • United Arab Emirates bank lost $35 million in a sophisticated bank heist using “deep-voice” technology. According to court documents, investigators in Dubai say the bank manager “received a phone call that claimed to be from the company headquarters. The caller sounded like the Director of the company, so the branch manager believed the call was legitimate.” The branch manager also received emails appearing to be from the Director relating to the phone call. Both by phone and email, the branch manager received instructions to transfer $35 million in a supposed company acquisition.
  • Criminals spoofed the Henry Ford Health system name to steal patient data. Henry Ford Macomb Hospital operators have been fielding up to 200 calls a day from people saying they received a phone call from the Hospital. In some cases, the name of a former Henry Ford doctor is displayed on their caller ID.
  • Microsoft Windows fake invoice scam starts with a phishing email so well-crafted it can fool experts. The bogus email includes a phone number which sets the stage for the real scam; criminals waiting to Vish the unsuspecting. If a person calls the phone number, the criminals try to get the target to download “helpful” software. In reality, that software gives the criminals remote access to the target’s computer and everything in it.

Social-Engineer Vishing Service — Test, Educate, and Protect

Vishing attempts are difficult to monitor and trace. Because of this, attackers are increasingly using this attack vector to extract information and compromise organizations. Security audits that include simulated attacks utilizing fully-trained and certified social engineers such as Social-Engineer’s Vishing Service (SEVS), are an effective way to assess vulnerabilities.

The best way to ensure lasting behavioral change is to teach employees how to recognize and respond to vishing threats. After all, it only takes one vishing attack to potentially devastate an entire company. Please contact our team today for a quote.

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.