Phone Call Scams

  • JANUARY 6TH, 2025
  • 2min read
Phone Call Scams

Introduction

Like phishing, phone call scams also known as voice phishing, short for vishing, have the same end goal to deceive and acquire private, sensitive credentials/information from individuals or businesses. If you have never experienced this, you might have heard or know an elderly person who has fallen victim to a phone call scam. Most of the times, it begins with a phishing email, and then the attacker uses phone calls to establish trust and connection and further manipulate the users by adding a sense of urgency.

Attackers can also pretend to be reputable companies or financial institutions, they dynamically respond to the victim’s behaviour and exploit emotional cues, something not easily achievable through standard phishing emails.

Now, with the help of AI Technologies like deepfakes, attackers can clone voices and easily deceive the victim like in the $25 million scam where the chief financial officer was tricked.

Best Practices to Mitigate Vishing

  • Security Awareness Training: Conducting security awareness training monthly or quarterly will keep employees alert and up to date about security threats and precautions which will in turn keep the organisation safe.
  • Oversharing: Avoid sharing personal information on the internet about yourself and your family. The attackers gather information about you online. The more you share, the more information they have to deceive you.
  • Multi-Factor Authentication: This is strongly advised because it gives you extra layers of security by making it harder for attackers to bypass the additional authentication barriers even if they get hold of your credentials.
  • Verify Caller’s Identity: Avoid sharing personal information on any call, especially with an unknown caller and you can verify the caller’s request and identity by reaching out to the individual or company/service provider the caller is identifying with.
  • AI Detection Tools: Investing in these tools will help to analyse and detect inconsistencies in the synthetic voice, such as unnatural pauses, mismatched intonation, or even inconsistencies between voice and background noise.
  • Email Security: Implementing protocols like DMARC (Domain-based Message Authentication, Reporting, and Conformance) reduces phishing attacks, email spoofing and other email-related threats.

Explore more CIL Advisories

Review Bombing Attacks and Extortion

Review Bombing Attacks and Extortion

IntroductionMalicious actors use "review-bombing", a coordinated flood of fake, one-star reviews as an initial step for extortion. This high volume…

NOVEMBER 26TH, 2025

Read More
Synthetic Phishing: AI-Enabled Insider Impersonation

Synthetic Phishing: AI-Enabled Insider Impersonation

IntroductionThreat actors increasingly use artificial intelligence (AI) to impersonate trusted individuals such as executives, employees, or suppliers within organisations. These…

NOVEMBER 24TH, 2025

Read More
The Silent Security Threat: Data Hoarding

The Silent Security Threat: Data Hoarding

IntroductionThe greatest risk to your organization may be the sheer volume of data we hold, a practice known as Data…

NOVEMBER 19TH, 2025

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Phone Call Scams

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .