Social Engineering Schemes
Social Engineering schemes manipulate victims (individuals, employees, etc.) into handing over sensitive information like passwords, bank account numbers, or even worse, complete control of their computer.
Even the most vigilant contact center agent is susceptible to these tricky schemes.
What is Social Engineering?
Criminals will pose as a representative of a large company (for example, Apple, Geico, or United Healthcare) calling in response to a question the victim supposedly has. But before they can proceed, the criminal must first "authenticate" the victim — verify a Social Security Number, a username and password, etc.
Sometimes, the criminal will even trick a victim into giving them remote access to their computer so the phony customer service rep can "fix" an issue.
SecureLogix's solution can be deployed in both SIP and TDM networks, and it integrates well with common network infrastructures. We support both large and small sites, and use nimble polices for detection and mitigation. Better yet, newly built business rules and policies are fed by call attributes and SIP signaling attributes, without impacting underlying software.
- Cloud-based deployment
- Call-control options
- Supports semi-static and dynamic white and black lists
- Customizable network queries on source number, number type checks, call authentication, etc.
- Accommodates industry regulatory requirements without changing software
Industries most vulnerable to Social Engineering schemes.
A U.S. nation-wide banking institution experienced call pumping attacks in the form of thousands of calls into the bank’s 1-800 contact center numbers.
A large, U.S. regional banking institution was the target of several Telephony Denial of Service (TDoS) attacks, resulting in the loss of all telephone/voice services across multiple retail branch locations for an extended period.
A large regional financial institution and its customers were victims of phone-based financial fraud and account takeover attacks inside the bank’s national contact center operation.
A nation-wide healthcare corporation was receiving urgent, weekly reports of Telephony Denial of Service (TDoS) attacks from many of its more than 250 member hospitals across the U.S.
An international financial credit rating organization discovered that there were plans to use social media to organize a flash-mob Telephony Denial of Service (TDoS) attack against its voice systems and services.