Bytagig

Keep your business protected from Vishing

Voice phishing plays a dangerous part in cybersecurity attacks

Women Holding Space Gray Iphone X and Black Pen

Phishing is a longstanding attack method used by hackers to steal personal data. Its modern counterpart, “Vishing,” operates with the same principle: steal personal data and info. Vishing is when third-parties attempt to hijack info but with voice calls. Like phishing, it uses social engineering to compromise security.

In a nutshell, Vishing callers pose as a trusted person and seek to gain valuable info about the receiver and/or company. According to the FBI and CISA, this trend has risen since July 2020. The increase is a direct result of companies utilizing remote working solutions. Remote working solutions required mass adoption, but, do not have the same security standards as a robust IT network.

During the mentioned attacks, hackers stole credentials and sold access information to third-parties. 

In an effort to help you identify and protect your business data from these attacks, we’ll break down “vishing” and how to keep your staff safe.

The nature of the vishing attack

Hackers targeting companies deployed a several-step method to compromise information. Initially, they registered domains to appear official or maintaining third-party resources. According to reports, the structure of these demains had similar structures:

Primarily, the goal was to make the landing page appear as a company’s internal VPN resource, with the goal to hijack 2FA (two-factor authentication) passwords and one-time activation codes. Thus, the plan was to send staff to these falsified domains in an attempt to compromise information later used for a cybersecurity breach.

Once established, third-parties worked to collect data about staff, creating “dossiers” to identify weak links. Hackers also used massive data hunting techniques, such as researching social media accounts, finding publicly available info, background-checking info, and available security check resources.

As the report explained, this info detailed various tidbits about staff depending on what was publicly available, such as full name, home address, their company position, their personal number(s), and how long they were at the company (or still are).

Standard fair for malicious third parties thus far. These methods are common with phishing attacks and other social-engineering schemes. Once collected, the attackers would use this data to launch falsified VoIP calls at specific staff. Combined with the social-engineering methods, the callers would pose as either staff of a company or even virtual IT assistance. During the calls, the located info was used to quickly gain the trust of the recipient. 

If successful, typically the caller would then convince the staff member a new link to VPN resources was sent to them. In reality, that resource was the compromised phishing domain. If accesses, workers unknowingly gave away 2FA codes.

The consequences

Once breached, hackers utilized the stolen credentials to sift through business networks. Afterward, they stole information ranging from account data and in some cases even financial information. 

As another example highlighting the dangers of social engineering, protecting your remote networks is critical. Fortunately, the FBI and CISA have a list of tips to keep in mind.

For Remote Network Management

For Remote Workers

At-home workers can use different techniques to protect themselves outside of company requirements.

Bottom line: it comes down to extra precautions taken by both user and company networks. Always double check contacts and links and, if you’re not entirely certain about something, err on the side of safety.

If you’d like additional assistance for strategies and company protection, contact Bytagig for more information

Share this post:
Exit mobile version