Phishing has been one of the most well-known cyber threats for years. In email phishing, the attacker attempts to steal sensitive data by sending a fake email. By implementing appropriate technical measures and training employees on how to handle and recognize these phishing emails, companies can establish an effective shield against phishing.
But what happens when an employee receives a call from a supposed superior with explicit instructions to make an urgent transfer or share sensitive information such as access data to privileged accounts over the phone? Is the telephone, the most traditional of all communication channels, vulnerable to cybercrime?
Let’s address this question later in the article and first delve into the concept of vishing. Vishing is a combination of "voice" and "phishing." For their attacks, fraudsters use stolen voice recordings that are manipulated using artificial intelligence to generate and deceptively imitate human speech. The speech patterns of a familiar person can be easily analyzed through machine learning and, which makes it particularly dangerous, reproduced.
Using neural networks, accents, speech speed, the timbre of a known voice, intonation in questions, and even emotional nuances can be embedded in the synthesized speech, making it almost indistinguishable from real speech to human perception and hearing.
Attackers can use deepfake AI to create audio recordings and make automated calls that even enable a conversation with the potential victim. Those who think they are safe by declining calls from "unknown callers" or believe they are on the safe side when the caller's name appears, proving the caller's identity, are mistaken.
The principle here is TRUST NO ONE (Zero Trust): In caller ID spoofing, the attacker manipulates caller information such as number or caller name. The attacker can enter any number, whether it's 911 or the superior's number, into the software of modern PBX systems.
The vishing attack often begins with the theft of voice data. This data can be publicly accessible in social networks or recorded phone calls. These data are then used for fraud through the aforementioned technologies.
It is remarkably easy for hackers to obtain usable data these days. Company websites often have entire organizational charts with employee names, positions, and associated photos. People share video posts containing voice data on social media platforms, which are often publicly accessible. Users may send voice messages through compromised accounts. These data are used by criminals for CEO fraud, for example. With about 100 words, which is less than a minute of speech material, state-of-the-art voice models can already produce accurate imitations.