What Is Vishing? And How to Protect Against It

Header

Author: Trend Micro

October 5, 2022

This article is from Trend Micro.

Vishing (a term created from “phishing” and “voice”), is a type of social engineering scam where attackers call victims over the phone under the guise of someone else, and with the intent to steal personal information and/or money.

Vishing frequently occurs in the form of an urgent, frequently coercive, telephone call — say, the victim’s account was “compromised”, and the caller requires a PIN number to authenticate their identity. They may also claim to be calling on behalf of a government body, like the IRS or the Social Security Administration. “Friendlier” vishing attempts will instead go the other route and inform the victim of some prize they’ve won.

How Does Vishing Work?

The success of vishing revolves around social engineering — exploiting the victim’s psychology to persuade them to carry out an act. Vishing perpetrators employ either threats or rewards to make victims feel they have to comply. Victims are often targeted through threatening voicemails, where the prospect of court cases and frozen accounts are frequently raised.

Vishing scammers also use caller ID “spoofing” to trick victims into believing a phone call comes from a place it does not — say, a legitimate business or a government office. Lastly, fraudsters may utilize personal information that they have obtained elsewhere (i.e., the dark web) in order to appear more professional — to defend against this possibility, we recommend Trend Micro ID Security.

Ultimately, despite advancements in technology, vishing attacks are still used by criminals because rapid, smooth talkers are as dangerous as they were 1,000 years ago. Vishing comes in different forms, but the goal is the same — to deceive the victim and extract information and/or money.

Types of Vishing

Vishing is a rapidly growing threat, up 550% from Q1, 2021 to Q1, 2022. The following list contains the main types to look out for.

Telemarketing

A marketer will inform you that you’ve won a prize. In order to receive the prize however, you’ll need to confirm your address and/or other details. (Gift cards are another variety.)

Computer Viruses

Your computer is taken over by an alert warning you that a virus has infected and disabled the machine. You’ll need to call the number to solve the problem, at which point the scammers will attempt to take control of your machine.

Government Impersonation

A government employee from an office such as the IRS will tell you that there’s some kind of problem. To proceed, you’ll just need to verify a few details.

Bank Impersonation

A bank employee will call to inform you that there’s a problem with your account. In order to fix it, they will first need your details.

Tech Support

A tech support agent will tell you that they’ve found an issue with your device. They may offer to send you a solution via email — this will contain a malicious phishing link.

Voicemail Attachment

You receive a voicemail SMS alert. If you open it, you are in danger of downloading malware to your phone.

Area Codes

Scammers know people are more likely to answer a call from their local area, and have the ability to create fake/duplicate numbers for this purpose.

Tech Sales

A salesperson will offer you a too-good-to-be-true deal on some type of service or device. Of course, they will first require your details!

How to Protect Yourself Against Vishing

Follow these tips and you’ll radically reduce the chances of falling victim to a vishing scam:

  1. Never give out information over the phone
  2. Be careful who you call — verify first
  3. Never answer calls from unknown numbers
  4. When in doubt, follow your gut-instinct
  5. Always verify who you’re talking to
  6. Be skeptical of what you’re told over the phone
     
    Trend Micro Mobile Security will give you the defense you need against vishing and other attacks. Download Trend Micro Mobile Security today — and guard against cyberthreats with:
  • Real-time Web Threat Protection
  • Cloud-based AI, Smart Protection Network™, which keeps track of evolving threats
  • Trend Micro Pay Guard, which opens payment windows
  • Anti-phishing/spam software
  • Folder shields that protect your most sensitive data
     
    Given you’ll be required to enter personal information on these kinds of platforms, ID Security will also ensure you’re never the victim of a data breach. And as ever, if you’ve found this article an interesting and/or helpful read, please do SHARE it with friends and family to help keep the online community secure and protected.

Source: pexels.com

Report a Scam!

Have you fallen for a hoax, bought a fake product? Report the site and warn others!

Help & Info

Top Safety Picks

Your Go-To Tools for Online Safety
Disclaimer: Some of the links here are affiliate links. If you click them and make a purchase, we may earn a commission at no extra cost to you.

  1. ScamAdviser App - iOS : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on iOS
  2. ScamAdviser App - Android : Your personal scam detector, on the go! Check website safety, report scams, and get instant alerts. Available on Android.
  3. NordVPN : NordVPN keeps your connection private and secure whether you are at home, traveling, or streaming from another country. It protects your data, blocks unwanted ads and trackers, and helps you access your paid subscriptions anywhere. Try it Today!
  4. Incogni : Incogni automatically removes your personal data from data brokers that trade in personal information online, helping reduce scam and identity theft risks without the hassle of manual opt-outs. Reclaim your privacy now!

Popular Stories

As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu

How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction