Introduction
Have you ever recieved a call where a person claims to be an official, bank employee or government personnel, asking to tell personal or financial information with the caller? Well, itâs very common and is known as Vishing.Â
To be precise, vishing is just the fancy name of the fooling around that we all experience on a daily basis. Its intention may or may not be to carry a fraudulent. Explore more about this attack in this post.
Technically, it is a variety of phishing attack wherein the attacker lures the victim using a phone/audio call, instead of email. Please note that the word âVishingâ is made up of voice and phishing. Hope these 2 words have already clarified a lot for you.
Just like any other attack, the functioning of this attack involves three aspects:
The Process
An attacker or group of attackers takes the help of a computing system that dials tons of numbers, featuring the same number combination, at once. Such bulk dialing is done in a hope that at least one or two calls will be connected to a potential/vulnerable victim.
Once the call is connected, the attacker now takes the cover up of an authorized person or a representative of government agencies/bank/financial institutes and creates a situation that would ask for immediate action.
For instance, the person with malintentions can tell the victim that the call is from the Income Tax department and the victim is eligible for a tax return to be claimed in the next one hour. To process the amount transfer, the victim has to share the right account details/net banking password/ATM PIN for verification right now.
To pursue the victim, attackers can also present the after-effect picture if immediately asked actions are not taken. They can tell the victim that their bank account would be seized or they have to pay a heavy return.
With all these things, panic is created around the victim and, one out of a hundred or thousand can fall into the trap.Â
Earlier, the phone number, from which vishing calls were made, was displayed on the phone screen of the victim. But, the advanced calling technology that weâve today is capable of hiding the identity.
As far as motives is concerned, attackers trying vishing conduct them to:
Phishing is an attackwhere attackers does the social engineering, takee the advantage of the emotional vulnerability of a person and used it against them. In phishing, threatening, benefit-offering, or lucrative emails are shared with the victims. This email either features a corrupted link or software and a persuading text that will compel the victim to entertain that link/software. Once itâs done, an attacker can extract money or steal data.
Vishing and smishing (smishing definition) are more or less similar to the above. The only difference is that vishing happens using voice calls and smishing takes place using SMS.
â
Here are the most commonly used vishing techniques that you should be aware of:
VoIP or Voice Over Internet Protocol is the most famous vishing technique as it makes the caller's identity completely hidden. VoIP numbers are not linked with any specific locations and usually start with 1-800.Â
It involves hiding the ID of the callers so that no one can make out who is calling. With the Caller ID spoofing technique, the attacker hides the location and identity while carrying out an attack.
There is software that helps attackers to call a particular location with the help of a message that mentions banks or police departments. Once the call is connected, a pre-recorded and automated message starts playing. The message might mention the urgency of sharing asked banking or crucial information.
Attackers often dig deeper into the dumpsters of organizations like banks, financial institutes, tax departments, and many others where crucial information may be stored.
â
Here are the most common vishing attack examples:
Attackers claim to be trusted tech support of a technology that youâre using and might offer you a lucrative deal or huge discount on the subscription. In order to claim the offer, the attacker will ask for critical information.
Hackers often disguise as bank representatives and tell victims about very lucrative loan offers. For further processing, they would ask for vital personal/professional/financial details.
In some vishing incidents, attackers can lure victims for huge returns out of a small investment. Itâs very common that attackers can suggest to you a new investment scheme/SIP/stock that offers high ROI.Â
To get started with the investment, certain banking information will be asked for.
A vishing attack may be presented to the victim as a medical emergency or a medical scheme offering better medical assistance and facilities.
â
As vishing is very common, learning about âhow to avoid vishing attacksâ is very important as it will help you reduce the impact and stay safe. Here are a few ways using which one can prevent vishing attacks, one type of cyber attack.
â
Itâs hard to survive in todayâs world where cyber-criminals are everywhere. As a vishing attack seems very genuine and is very persistent, itâs hard to stay away from its reach. However, certain awareness and attentiveness can keep you safe.
Subscribe for the latest news