Voice phishing

Voice phishing is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpose of financial reward. It is sometimes referred to as 'vishing',[1][2] a word that is a combination of "voice" and phishing. Voice phishing exploits the public's trust in landline telephone services, which have traditionally terminated in physical locations known to the telephone company, and associated with a bill-payer. Voice phishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.

Some fraudsters use features facilitated by Voice over IP (VoIP). Features such as caller ID spoofing (to display a number of their choosing on the recipients phone line), and automated systems (IVR).

Voice phishing is difficult for legal authorities to monitor or trace. To protect themselves, consumers are advised to be highly suspicious when receiving messages directing them to call and provide credit card or bank numbers—vishers can in some circumstances intercept calls that consumers make when trying to confirm such messages.

Example

  1. The criminal either configures a war dialer to call phone numbers in a given region or list of phone numbers stolen from an institution.
  2. Typically, when the victim answers the call, an automated recording, often generated with a text to speech synthesizer, is played to alert the consumers that their credit card has had fraudulent activity or that their bank account has had unusual activity. The message instructs the consumers to call a specific phone number immediately. The same phone number is often shown in the spoofed caller ID and given the same name as the financial company they are pretending to represent.
  3. When the victim calls the number, it is answered by automated instructions to enter his or her credit card number or bank account number on the key pad.
  4. Once the consumer enters a credit card number or bank account number, the visher has the information necessary to make fraudulent use of the card or to access the account.
  5. The call is often used to harvest additional details, such as security Personal identification number (PIN), expiration date, date of birth, etc.

Although the use of automated responders and war dialers is preferred by the vishers, there have been reported cases where human operators play an active role in these scams, in an attempt to persuade their victims. Posing as an employee of a legitimate body such as the bank, police, telephone or internet provider, the fraudster attempts to obtain personal details and financial information regarding credit card, bank accounts (e.g. the PIN) as well as personal information of the victim. With the received information, the fraudster might be able to access and empty the account or to commit identity fraud. Some fraudsters may also try to persuade the victim to transfer money to another bank account or withdraw cash to be given to them directly.[3]

Another simple trick used by the fraudsters is to ask the called parties to hang up and dial their bank, but after the victim hangs up, the fraudster does not, keeping the line open and remaining connected when the victim picks up the phone to dial.[4] When in doubt, calling a company's telephone number listed on billing statements or other official sources is recommended, as opposed to calling numbers received from messages or callers of dubious authenticity. However, sometimes hanging up and redialing is insufficient: if the caller has not hung up, the victim might still be connected, and the fraudster spoofs a dial tone down the phone line to entice the victim to dial. Then the fraudster's accomplice answers and impersonates whomever the victim is trying to call.[5] This is known as a 'no hang-up' scam.[6] Hence consumers are advised to use a different phone when dialing a company's number to confirm.

Bank account data is not the only sensitive information being targeted. Fraudsters are also trying to obtain security credentials from consumers who use Microsoft or Apple products by spoofing the caller ID of Microsoft or Apple Inc..

See also

References

  1. "Crooks Net Millions in Coordinated ATM Heists — Krebs on Security". krebsonsecurity.com. Retrieved 2018-09-04.
  2. Romney, Marshall and Paul Steinbart (2015) Accounting Information Systems, 13th ed., Chapter 13 - The expenditure cycle: Purchasing to cash disbursements, Upper Saddle River, NJ:Pearson Education, p. 162
  3. Association, Press (2013-08-28). "'Vishing' scams net fraudsters £7m in one year". the Guardian. Retrieved 2018-09-04.
  4. "'Vishing' and courier scam complaints increase". BBC News. Retrieved 26 November 2015.
  5. "Barclays refunds grandmother's £68k following vishing scam". BBC. Retrieved 4 August 2014.
  6. Milligan, Brian (6 July 2015). "Banks not liable in most vishing fraud, says Ombudsman". BBC News Online. Retrieved 17 September 2015.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.