Voice phishing

Cybercriminals use phone calls to trick victims.
NFIR beeldmerk kleur
NFIR beeldmerk kleur

Voice phishing

Cybercriminals use phone calls to trick victims.

Every day businesses receive calls from various parties such as potential & existing customers, suppliers and colleagues.
But what if the person on the other end pretends to be such a party, but is not one at all?
In addition to classic email phishing, cybercriminals also employ voice phishing, better known as vishing.

Voice phishing

In this social engineering attack, the attacker uses the phone to trick potential victims into pulling sensitive information, such as login credentials, financial data and/or other confidential data.
The attacker often poses as a trusted entity such as a bank employee, government official, technical support or representative of a well-known company.
However, especially in large organizations, an attacker may also pose as a colleague.

A single phone call can be enough for a cybercriminal to cause a major incident. Our voice phishing actions are a good measure of your organization’s awareness level and increase resilience against this form of phishing.

How does voice phishing work?

During the voice phishing attack, attackers use various manipulative tactics such as fear, urgency or helpfulness to pressure or entice victims to get them to provide the requested information. In doing so, cybercriminals use sophisticated social engineering techniques to gain victims’ trust and convince them that the call is legitimate.

Cybercriminals try to stay under the radar, and thanks to tools, they usually succeed. The success rate of a voice phishing attack is high. That’s because they use spoofing techniques, among other things. Caller ID spoofing involves using a legitimate phone number of an existing person or organization. Also, cybercriminals may call anonymously.
Therefore, it is very difficult to recognize at the other end of the line that you are dealing with a cybercriminal.

Why should my organization conduct a voice phishing test?

Organizations can train their employees to recognize voice phishing attacks and implement policies and procedures to protect sensitive information.

Voice phishing is hard to spot compared to other phishing methods. In NFIR’s voice phishing simulations, we mimic social engineering techniques and capitalize on human characteristics to obtain confidential data or get employees to perform certain actions.
We summarize the results of the research in a report and provide your organization with advice on how to guard against these attacks.

Strengthen your resilience against the most common technique used by cybercriminals

Become resilient against the most common technique used by cybercriminals

Also check out our other security awareness services

SECURITY INCIDENT BIJ UW ORGANISATIE?

De volgende 30 minuten zijn van cruciaal belang​!

De eerste 30 minuten na een cyber security incident zijn cruciaal, omdat een snelle en adequate reactie de schade kan beperken. Daarnaast kan verdere verspreiding van de aanval worden voorkomen en kan essentieel bewijsmateriaal veiliggesteld worden voor nader onderzoek.

Ons Computer Emergency Response Team (CERT) staat 24/7 klaar om bedrijven en organisaties te ondersteunen bij IT-beveiligingsincidenten.

Heeft uw bedrijf professionele hulp nodig bij een beveiligingsincident? 

SECURITY INCIDENT AT YOUR ORGANIZATION?

The next 30 minutes are crucial!

The first 30 minutes after a cyber security incident are crucial because a quick and adequate response can limit the damage.
In addition, further spread of the attack can be prevented and essential evidence can be secured for further investigation.

Our Computer Emergency Response Team (CERT) is available 24/7 to support businesses and organizations during IT security incidents.

Does your company need professional help with a security incident?