1 min read

Voicemail Phishing Attacks Called Vishing Are On The Rise

While “vishing” is by no means a new threat, it’s not something that has ever happened with sufficient frequency to get most people’s attention. So, if you haven’t heard the term before, you’re not alone.

“Vishing” is short for voicemail phishing, and it is apparently on the rise based on data collected by the security firm Zscaler. Attackers are specifically targeting tech firms and US military installations.

No actual voice mails are involved, which is interesting.  What the attackers do is send emails with links that supposedly point the way to voicemail messages stored on LinkedIn, WhatsApp, or other services. The idea behind the attacks are is to trick an unsuspecting recipient into disclosing his or her Outlook or Office 365 credentials.

To make their credential capture page more convincing, the attackers have even taken to deploying a CAPTCHA system, which makes the page look just annoying enough to be legitimate.

A spokesman for Zscaler had this to say about the company’s recent discovery of the surge in vishing attacks:

“Voicemail-themed phishing campaigns continue to be a successful social engineering technique for attackers since they are able to lure the victims to open the email attachments. This combined with the usage of evasion tactics to bypass automated URL analysis solutions helps the threat actor achieve better success in stealing the users’ credentials.”

The folks at Zscaler have a point. If your employees haven’t been made aware that this kind of attack is not only possible but growing in popularity in certain sectors, make sure they know what to be on the lookout for. Kudos to the sharp-eyed folks at Zscaler for spotting the trend.

The Goal is to Frustrate Hackers’ Efforts

We may not be able to keep hackers from making the attempt. However, if we can warn enough people about the tricks they’re using, we can frustrate their efforts and that’s a good start.

Used with permission from Article Aggregator

Escaping the Black Hole: Engineering ML Pipelines That Defy Data Gravity

Escaping the Black Hole: Engineering ML Pipelines That Defy Data Gravity

For years, we’ve heard the mantra that data is the new oil, a valuable resource to be extracted and refined. But any IT director managing a growing...

Read More
Top 5 Managed IT Service Providers for Portland Businesses

Top 5 Managed IT Service Providers for Portland Businesses

If you run a business in Portland, there is a good chance you have felt at least one of these in the last year:

Read More
The Oregon Consumer Privacy Act : IT Checklist for Portland Businesses

The Oregon Consumer Privacy Act : IT Checklist for Portland Businesses

The OCPA is Here to Stay: What Portland Businesses Need to Know in 2026 When the Oregon Consumer Privacy Act (OCPA) first went into effect in July...

Read More

Microsoft Teams Gets Optimizations To Use Less Resources

Do you use Microsoft Teams and do you have an older PC that struggles with Teams video meetings? If so there’s good news. Microsoft has recently...

Read More

Update Now If You Run This WordPress Plugin

Millions of people around the world have leveraged the awesome power of WordPress to build their sites. Whether for personal or business use,...

Read More

Large Company Snap-On Tools Recently Hit By Data Breach

If you have any tools in your garage, odds are good that at least a few of them are Snap-on tools. The brand is ubiquitous in the United States and...

Read More