Vishing

Description: Vishing, or voice phishing, is a type of cyber attack that uses phone calls to trick individuals into revealing personal information such as credit card numbers, passwords, or bank account details. This method relies on social manipulation, where the attacker presents themselves as a trustworthy entity, such as a bank, utility company, or government agency. Often, vishing is carried out using spoofing technologies that allow the attacker to falsify the phone number displayed on the caller ID, increasing the credibility of the attack. Attackers may use pressure, urgency, or fear tactics to persuade victims to act quickly and without thinking. The growing reliance on phone communication and a lack of awareness about associated risks have contributed to the proliferation of this type of fraud. In the context of security, vishing poses a significant challenge for organizations, as it can compromise sensitive customer information and damage the company’s reputation. Therefore, it is crucial for both businesses and individuals to be informed about the tactics used in vishing and to take proactive measures to protect themselves against these attacks.

History: The term ‘vishing’ began to gain popularity in the early 2000s when email phishing attacks became common. With the advancement of telephone technology and the proliferation of mobile phones, attackers began using phone calls as a new medium for committing fraud. One significant event in the history of vishing occurred in 2006 when several cases of attacks were reported in which criminals posed as bank representatives to obtain personal information from victims. Since then, vishing has evolved, adapting to new technologies and communication methods, leading to an increase in the sophistication of these attacks.

Uses: Vishing is primarily used to obtain personal and financial information from victims. Attackers may employ this technique to access bank accounts, carry out fraudulent transactions, or even steal identities. Additionally, some malicious organizations use vishing as part of broader social engineering campaigns, combining it with other attack methods to maximize effectiveness. Businesses can also be targets of vishing, where attackers attempt to gather confidential information about customers or employees.

Examples: An example of vishing occurred in 2019 when a group of criminals posed as bank representatives and called customers, requesting account information under the pretext of a ‘security verification.’ Another notable case was the attack on a utility company where attackers called employees, pretending to be from the IT department, and managed to obtain access credentials to internal systems. These examples illustrate how vishing can be used to compromise both personal and business information.

  • Rating:
  • 3
  • (5)

Deja tu comentario

Your email address will not be published. Required fields are marked *

PATROCINADORES

Glosarix on your device

Install
×
Enable Notifications Ok No