Skip to main content
Vishing

Vishing and the Monarch Casino Heist: Social Engineering News 

By April 26, 2023No Comments

Vishing attacks were prominent in Q4 2022, increasing 142% from Q3 2022 according to the February 2023 Trellix Threat report. Vishing or “voice phishing” is the act of making fraudulent phone calls to manipulate a person. Attackers will target sensitive information that can lead to a data, network, or financial breach. When malicious actors call, they often employ social engineering tactics to trick their targets. They may pose as an authority figure, technician, or fellow employee. Such was the case for Twitter in the summer of 2020. Impersonating as internal Twitter employees, attackers made vishing calls to Twitter’s tech support and consumer services employees. Their instructions were simple – we need you to reset your password.

To add authenticity, attackers may “spoof” or fake their outgoing phone number. They may also use voice changers to conceal their identity or use artificial intelligence-based software to mimic authentic voices.

As you will see in the following news story, vishing led to the largest casino heist in Colorado history.

Vishing Monarch Casino

As reported by 9NEWS, a Monarch Casino cashier packed half a million dollars into a box and then drove off in a minivan. According to investigators, the cashier received a call on the casino’s phone from a man purporting to be Monarch’s head of operations. The “head of operations” told her there was a problem with a UPS order that would result in a breach of contract. She was then told to take $500,000 from the casino and bring it to St. Anthony’s hospital where it would be picked up and then delivered to a casino lawyer.

Vishing Monarch Casino

Image: 9NEWS

Commenting on the heist, Ron Kammerzell, a regulatory consultant for the gaming industry, said, “For something like that to happen, it would’ve had to defeat many different levels of casino controls within the property.”

The cashier told investigators she was aware of casino procedures but said she didn’t follow them because a “Casino Member” instructed her to do otherwise.

Test. Educate. Protect

The Monarch Casino heist highlights the need for each employee to receive security awareness training that focuses on social engineering tactics. Your company no doubt recognizes the need for such training but may find it difficult to implement. Social-Engineer’s Managed Vishing Service can fill this security gap for you.

Our Managed Vishing Service identifies risk and assesses vulnerability within your organization’s human network. Engagements focus on simulation of social engineering attacks, determining the potential for breaches and compromise of corporate assets. Hundreds to thousands of calls per month can be made to your employees by certified social engineers capable of pivoting and adjusting conversation like a real attacker. We do not use script-driven call center staff, and we never use robocallers!

Not sure yet if this service is right for you? We invite you to learn more about our dataset of vishing calls in the Social-Engineer State of Vishing Report. This report is the result of over 83,000 calls and countless hours ensuring our processes and data will help arm you with the best information about malicious social engineering attacks.

Don’t wait until it’s too late. Act now to protect your company’s brand reputation, money and assets, and sensitive information from malicious actors. Please contact us today for a Managed Vishing Service consultation.

Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
Security Assessment Case Study
Learn more about the importance of a Social Engineering Risk Assessment.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
What Makes Us Different
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will go through how we can protect your company and what makes us different.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Woman vs Machine
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each of these has evolved beyond their clockwork origins.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
Vishing and Phishing Must Be Ongoing to Be Effective
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible. In our experience, many of these programs take the form of computer-based training.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
A Case Study in Vishing
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or call centers for large volume engagements. If they are using trained humans to make calls, it is likely in very low numbers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
Benefits of a Social-Engineering Risk Assessment Engagement
Your company is important. Indeed, the data you hold for your clients or employees is very valuable and attackers seek to capitalize on that data any way they can. This is where a Social Engineering Risk Assessment (SERA) engagement can help uncover possible vulnerability to attackers.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.
The Business Value of the Social-Engineer Phishing Service
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR report, of the 3,841 security breaches reported using social engineering, phishing was the key vector for over 80% of them.