Youโ€™ve heard of โ€œphishing,โ€ in which scammers try to steal your information via computer.

Now, voice phishing, or โ€œvishing,โ€ is an emerging threat in which scammers seek to get your information through one of the most trusted forms of communicationโ€”the telephone.

ย โ€œThe best way to prevent falling victim to a vishing scam is simple: do not give your credit-card number, verification code, PIN or other sensitive information to an unsolicited or unknown caller,โ€ said Chief Administrative Officer Phil Stevens, who oversees the Exchangeโ€™s IT Directorate.

โ€œYou never know whoโ€™s on the other end of the line.โ€

Beginning with a phish

Some legit organizations use telephone calls to verify account and billing information. Consequently, some phone targets of scammers let their guards down, which they wouldnโ€™t for emails.

โ€œYou never know whoโ€™s on the other end of the line.โ€

โ€“Phil Stevens,
chief administrative officer

Many vishing attacks begin with simple phishing e-mails or phone text messages, urging recipients to call a toll-free number.

Using multiple contact methods establishes an innate sense of trust in the recipients, and makes them more likely to fall victim to the scam, Stevens warned.

Appealing to fear

Additionally, vishing appeals to a personโ€™s feelings of urgency and fear.

The most common vishing schemes begin with an automated message: โ€œYour account has been compromisedโ€ or โ€œWe have detected a fraudulent charge.โ€ The recipient is told to call a number to update account information.

Going โ€˜bohoingโ€™ in the night

Phishing and vishing also acquire trust of their targets by mimicking a real organization or person. This is called pretexting or bohoing.ย  A vishing scam can copy the caller ID information of a real organization, making the call appear legitimate.

Many voiceover IP (VoIP) services have more relaxed policies regarding caller ID than telephone companies, so vishers using these services can pretend to be anyone.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

The Exchange Post