What Is a Vishing Attack, and What Does It Look Like?
Vishing attacks can take many forms, but the hallmark of vishing is unsolicited telephone calls to your employees. Usually, these phone calls pretend to be from a legitimate organization that your company may work with already. More sophisticated vishing attacks will spoof the caller ID as well. Some examples of vishing attacks include:What Is a Vishing Attack, and What Does It Look Like?
- The bank scam. In this vishing attack, someone calls a representative of your company, pretending to be from the bank that processes your payroll checks. The scammer then claims that something has gone wrong with the payments: perhaps there was an error or a data breach. In this scam, the scammer’s ultimate goal is to get your company’s banking information (which can include usernames, passwords, bank account numbers, and more).
- The IRS scam. We’ve all gotten those robocalls that claim to be from the IRS. Most of these vishing attacks aren’t very sophisticated, opting instead to contact as many people in as short a period of time as possible, but some of them do spoof legitimate IRS phone numbers on the recipient’s caller ID.
- Tech support. Vishing attacks can also impersonate your own company. This is particularly common in spear-phishing and whaling attacks. The scammer usually claims that some work needs to be done on an employee’s computer, and then directs the recipient to a fraudulent website, where they download malware that infects their computer, potentially compromising the entire network...
Tags
#Phone Scam
#Social Engineering
#Vishing