Man
Professional
- Messages
- 3,218
- Reaction score
- 783
- Points
- 113
Voice phishing (Vishing) is a type of social engineering in which an attacker calls the victim by phone, posing as an employee of a bank, support service, government agency or other trusted person in order to trick confidential data (passwords, PIN codes, card numbers, 2FA codes, etc.). This is an illegal and dangerous practice that can lead to financial losses and personal data leaks. Below are the technical and psychological aspects of vishing attacks for educational purposes.
1. How does Vishing work?
Step 1: Preparation
The attacker collects information about the victim:- First name, last name, phone number (via data leaks, social networks or random dialing).
- Information about the bank, mobile operator or service used by the victim.
- Security questions (e.g. mother's name, city of birth) are often publicly available.
Step 2: Call the Victim
Attacker:- Uses VoIP services (e.g. Skype, SIP telephony) to mask the number.
- Introduces himself as an employee of a bank, tax office, police or support service.
- Creates a sense of urgency:
"Your account has been hacked, please send me the 2FA code immediately!"
"There are suspicious transactions on your account. Please provide the PIN code to block it."
Stage 3: Psychological pressure
The attacker uses manipulation tactics:- Fear: "If you don't provide your data, your account will be blocked forever!"
- Trust in authority: "I'm calling from the Central Bank's security department."
- Urgency: "You have 5 minutes to confirm your identity, otherwise the money will be stolen."
Step 4: Obtaining Data
The victim, believing the threat, says:- 2FA codes received via SMS.
- Account passwords.
- Card numbers and PIN codes.
- Transfers money to a "safe account".
Step 5: Using the data
Attacker:- Logs into the victim's accounts (banking, mail, crypto wallets).
- Transfers money to his own accounts or sells data on the darknet.
- Uses the information for further attacks (for example, on the victim's friends or relatives).
2. Technologies used in Vishing
A. Spoofing (number masking)
- The attacker changes the number displayed on the victim's screen to make it look official (for example, a bank's customer service number).
- Tools: VoIP services with Caller ID change function (e.g. SpoofCard, Burner).
B. Answering machines and voice robots
- Used for mass mailings of automatic messages, for example:
"Call XXX-XXX immediately to unblock the card!" - Tools: Twilio, Amazon Polly (for speech synthesis).
C. Voice templates and AI
- Modern AI models (like Google Duplex) can mimic natural speech, making calls more convincing.
- Example: An attacker records the victim's voice from social media and uses AI to create fake messages.
D. Roaming and international calls
- Fraudsters from one country call victims in another, using local numbers to increase trust.
- Example: A number with a US area code (+1) calls a victim in Russia, claiming to be from a local bank.
3. Examples of real Vishing attacks
Example 1: Attack on bank clients
- The attacker calls the bank's client and says:
"We have noticed suspicious activity on your account. To confirm your identity, send the code from the SMS." - The victim, frightened, gives the code, and the attacker transfers the money to his account.
Example 2: Vishing via crypto exchanges
- The attacker calls the owner of the crypto wallet:
"Your account has been hacked. Transfer funds immediately to our secure wallet for protection." - The victim transfers bitcoins to a specified address, which is controlled by the attacker.
Example 3: Spoofing Apple Support
- The attacker calls the iPhone user:
"Your Apple ID has been locked due to suspicious login. Please provide your password to unlock your account." - After receiving the password, the attacker blocks the victim's device and demands a ransom (Ransomware attack).
4. Why is Vishing dangerous?
- Highly effective: People tend to trust the voice, especially if the call seems official.
- No digital footprints: Unlike phishing sites, calls are difficult to trace.
- Psychological pressure: Fear and urgency reduce the victim's critical thinking.
- Difficulty of proof: It is difficult to quickly identify the attacker, especially if he uses anonymous VoIP services.
5. How to protect yourself from Vishing?
A. Do not transmit data over the phone
- Banks, tax authorities and services never ask for passwords, PIN codes or 2FA codes.
- If the call seems suspicious, hang up and call the official number.
B. Check the authenticity
- Ask the caller his name, title and department.
- Call the company's official number (find it on the website or receipt) and clarify the information.
C. Use secure authentication methods
- Ditch SMS codes in favor of:
- Hardware tokens (YubiKey).
- Authenticator applications (Google Authenticator, Authy).
- Secure keys (FIDO2).
D. Training and Awareness
- Educate loved ones (especially older ones) about the risks of vishing.
- Conduct social engineering training (e.g. attack simulations) in companies.
E. Use Call Blocking Tools
- Install spam blocking apps:
- Truecaller (Android/iOS) — identifies suspicious numbers.
- RoboKiller - blocks autodialing.
F. Limit access to personal data
- Do not publish in the public domain:
- Phone number.
- Date of birth.
- Mother/Father's name.
- Use private profiles on social networks.
6. Legal consequences
Vishing violates the laws of many countries:- USA: Computer Fraud and Abuse Act (up to 10 years in prison for fraud).
- Russia: Article 138 of the Criminal Code of the Russian Federation (unauthorized access to computer information) and Article 159 (fraud).
- EU: GDPR (unlawful collection of personal data, fines up to €20 million).
7. Educational resources
If you want to learn how to protect against vishing and other attacks:- Books: "The Art of Deception" (Kevin Mitnick), "Hacking Exposed 7" (McGraw-Hill).
- Platforms: TryHackMe (social engineering courses), OWASP.
- Certifications:
- Certified Ethical Hacker (CEH) - analysis of social engineering methods.
- CISSP — Cybersecurity.
Summary
Vishing is a dangerous attack that relies on human manipulation. Never share sensitive data over the phone, even if the call seems official. Instead, focus on protecting your data and educating those around you. If you're interested in practical examples or code to teach, let me know!
Last edited by a moderator: