A new report released by Crowdstrike in Year 2 said that the attacks called Voice Phishing have grown stunning by 5 % in year 2. Vishing is a cyber attack that uses phone calls or voice messages to deceive people and receive sensitive information.
A new report released by Crowdstrike in Year 2 said that the attacks called Voice Phishing have grown stunning by 5 % in year 2. Vishing is a cyber attack that uses phone calls or voice messages to deceive people and receive sensitive information.
Change the focus of hackers from software to humans
Stephanie Karadz, a global cyber crisis management official at IBM, says cybercriminals are now more likely to resort to social engineering and deceit. “Software can be updated, but humans are not more and more difficult to ignore a phone call than deleting a suspicious email,” he says.
He adds that in numerous social experiments, his team has always been able to infiltrate the company’s support department.
The entry of artificial intelligence into the field
The emergence of advanced artificial intelligence tools has made the conditions much more favorable for attackers. Using “Audio Dip -Phone” technology, criminals can now imitate people’s voices carefully and, for example, contact the voice of a manager, family member or even user.
Security researcher Suraj Satanaraian warns about the power of these tools: “With a few seconds recorded sound, these models can do a complete conversation with tone, accent and natural emotions.” He emphasizes that this capability has brought social engineering to a new stage.
The actual example of this threat was an attack in which a researcher from Palo Alto Networks was targeted by fake voice calls with his daughter’s voice.
How to protect ourselves?
Satanaras recommends that people with their relatives define a specific security password or phrase so that they can be identified in times of contact. Also, the Identity of the Contractor must be approved through other channels, especially when the request for money, password, or sensitive information is raised.
He also offers companies to train employees and not to make sure the call number or Caller ID display. Implementing “zero trust” policies in working communication can also be very effective.
RCO NEWS




