Threats & AttacksHigh
Vishing
A phishing attack that uses voice calls or voicemail messages to trick users into revealing sensitive information or performing actions
Skill Paths:
Social EngineeringSecurity AwarenessThreat IntelligenceIncident Response
Job Paths:
Security Awareness TrainerThreat Intelligence AnalystIncident ResponderSecurity Analyst
Relevant Certifications:
CompTIA Security+CEHCISSPSANS SEC301
Content
What is Vishing?
Vishing (voice + phishing) is a social engineering attack that uses voice calls or voicemail messages to trick users into revealing sensitive information, such as passwords, credit card numbers, or personal details. Vishing attacks exploit the trust people place in phone calls and the difficulty of verifying caller identity.
How Vishing Works
Attack Process
- Target identification – Gather phone numbers and personal information
- Caller ID spoofing – Forge caller ID to appear legitimate
- Script preparation – Create convincing conversation scripts
- Call execution – Make calls to target numbers
- Information extraction – Convince victims to reveal sensitive data
Common Techniques
- Caller ID spoofing – Display fake phone numbers
- Authority impersonation – Pretend to be from trusted organizations
- Urgency tactics – Create time pressure to act quickly
- Social proof – Reference other "customers" or "employees"
- Technical jargon – Use confusing technical terms
Types of Vishing Attacks
Credential Theft
- Banking calls – Fake security alerts from banks
- IT support – Pretend to be technical support
- Account verification – Request sensitive information
- Password reset – Trick users into revealing credentials
Financial Fraud
- Tax scams – Fake IRS or tax authority calls
- Investment opportunities – Fraudulent investment schemes
- Charity scams – Fake donation requests
- Lottery scams – Fake prize notifications
Corporate Espionage
- Employee impersonation – Pretend to be company employees
- Vendor calls – Fake calls from business partners
- System access – Request remote access to systems
- Information gathering – Collect sensitive business information
Detection and Prevention
Technical Controls
- Caller ID verification – Verify caller identity
- Call blocking – Block known malicious numbers
- Voicemail security – Secure voicemail systems
- Call recording – Record suspicious calls for analysis
User Education
- Security awareness training – Phone security education
- Verification procedures – How to verify legitimate calls
- Red flags identification – Recognize suspicious call patterns
- Reporting mechanisms – Report suspicious calls
Organizational Measures
- Phone security policies – Clear guidelines for phone security
- Incident response plans – Prepare for vishing incidents
- Regular training – Keep awareness current
- Threat intelligence – Stay informed about new tactics
Response and Recovery
Immediate Actions
- End suspicious calls – Hang up on suspicious callers
- Report incidents – Notify security teams
- Change passwords – If credentials were compromised
- Monitor accounts – Watch for unauthorized activity
Investigation Steps
- Call analysis – Examine call details and recordings
- Caller ID analysis – Investigate spoofed numbers
- Impact assessment – Determine scope of compromise
- Documentation – Preserve evidence for analysis
Best Practices
- Verify caller identity – Call back using official numbers
- Don't share sensitive information – Never give passwords over the phone
- Use official contact methods – Contact organizations directly
- Enable call screening – Use call screening features
- Report suspicious calls – Help protect others
- Trust your instincts – If something seems wrong, it probably is
Quick Facts
Severity Level
7/10
Goal
Steal credentials, gain unauthorized access, or commit fraud
Delivery
Voice calls, voicemail messages
Targets
Phone users, employees, individuals
Prevention
User education, verification, caller ID
Related Terms