|
Vishing (the combination between Voice and Phishing) is an attack method that tries to convince users to provide their sensitive personal or professional information, usually financial information, via voice calls.
1. Recognize the warning signs
|
|
A) Generic greeting: Attackers rarely know user's names
|
|
B) Sense of urgency: It's frequent to emphasize the urgency of the situation to lead victims to do what they want
|
|
C) Immediacy: The goal of attackers is to lead you to act immediately. To trigger those actions, they use awards, special and limited gifts, or emphasize the urgency of certain situations, such as unlocking a device or unblocking bank accounts
|
|
D) Representation of trusted entities: Attackers often identify themselves as representatives of trustworthy entities, such as banks, tech companies, telecom companies, post offices, among others
|
|
E) Personalized information: Even when the contact seems reliable because it uses your name, postal code, or position, always confirm the source, namely by searching or by directly contacting the entity in question
|
|
|
|
Do not provide contact information or any information concerning your corporate structure or activity by telephone
|
|
Do not provide sensitive data, namely financial data, or credentials to access financial data, especially when the contact is initiated by the other person
|
|
Regardless of their nature, do not perform the tasks requested during the call
|
|
Never make any payment. This is a strong indicator that you are being a victim of attempted fraud
|
|
|
3. Be critical, do your research, and hang up when in doubt
|
|
Do not trust phone calls where callers ask for sensitive information or money
|
|
In case you doubt the caller's identity:
|
|
A) Go to the real website of the institution independently and confirm the telephone number
|
|
B) Ask for technical information that only a real employee could know, and analyse their answer
|
|
C) Search for the contact on the Internet. There are forums and websites that describe scams where you can identify common aspects of the contact you just received
|
|
If there's still doubt, hang up. Then, look for the real contact of such entity and see if the number that called you was, in fact, reliable
|
|
Avoid giving any sensitive data when you are the call recipient. If you think it's worth it, use the number and call the entity in question yourself
|
|
|
|
|