Monday, March 20, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
World Cybercon Middle East
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacking News
    • Ransomware News
    • Vulnerabilities
    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

    Tri Counties Bank cyber attack

    Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

    Microsoft Outlook Vulnerability

    Microsoft Outlook Zero Day Vulnerability Actively Exploited

    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    Gamekaking Data Breach

    Gamekaking Data Breach? Leakbase Claims to Upload 19 Million Rows of Stolen Information

    Medusa Ransomware Group

    Medusa Ransomware Group Targets National Institute of Ocean Technology

    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Clop Ransomware Group Adds Hitachi Energy

    Hitachi Energy Confirms Security Incident After Clop Ransomware Adds it to Victim List

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    BreachForums

    FBI Arrests BreachForums Operator ‘Pompompurin’, Slaps Cybercrime Charges

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Insider threat mitigation

    Behavioral Psychology, a Boon for Insider Risk Mitigation

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    GISEC Global 2023

    GISEC Global 2023: H.E. Dr Mohamed Hamad Al-Kuwaiti Recognized for Outstanding Contributions in Advancing Global Cybersecurity

    GISEC Global 2023

    GISEC Global 2023: Knowledge Sharing, Collaboration Vital to Fend off Cyberattacks, say Experts

    Call & Contact Center Expo 2023 Las Vegas

    Call & Contact Center Expo 2023 Las Vegas

    Former BookMyShow CTO Mahesh Vandi Chalil

    Cyble Appoints Former BookMyShow CTO Mahesh Vandi Chalil as Chief Product and Technology Officer

    GISEC 2023

    GISEC 2023: Microsoft Highlights Zero Trust Approach and Mixed Reality Policing Tools

    GISEC Global 2023

    GISEC Global 2023: ‘Take the Fight to Cyber Attackers’ Urges UAE Cybersecurity Council Paper

    Cyble in Forbes List

    Cyble Recognized by Forbes as One of America’s Best Startup Employers 2023

    Cybersecurity Excellence Awards

    Cybersecurity Excellence Awards: Cyble Rated Fastest Growing Cybersecurity Company

    Cyble Among Top 50 Emerging Companies

    Cyble Among Top 50 Emerging Companies Across Governance Risk & Compliance Solutions Sector

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    •  Cyber Security Webinar
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Features

Voice Networks are Under Attack – is Anybody Listening?

Why, with the nearly $172 billion in expenditures put forth by companies to secure IT infrastructures and digital networks, is the threat of voice phishing so rampant?

Editorial by Editorial
February 4, 2023 - Updated on February 22, 2023
in Features, Firewall Daily
0
Voice Networks
598
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter

by Brian McDonald, Security Officer, Mutare, Inc.

Who would have guessed that, in 2022, the humble phone would become a favorite weapon for cybercriminals intent on infiltrating high-profile organizations in order to disrupt operations, embed ransomware news advance extortion schemes, and steal customer data?

You might also like

US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

Just ask Twitter, Twilio, Cisco, Robinhood and Uber. Despite the technological sophistication of their own offerings, all fell victim to damaging data breaches perpetrated by criminal agents whose point of entry was through a simple phone call. This emerging threat vector has come to be known as “voice phishing” or simply, vishing.

Obviously, there is nothing new about scam calls. However, voice phishing has steadily evolved into a criminal artform.

Most commonly, the attack is perpetrated by an adversary, either working alone or as part of an organized cybercriminal gang, who first seeks out vulnerable human targets through data mining and reconnaissance calling.

Once a connection is made, the impostor gains trust through psychological manipulation (social engineering) in order to extract protected information or account login credentials.

Sometimes the call comes on the heels of a related email notification or text message. Other times an email or text may include a call-back number that connects the victim to a call center manned by co-conspirator agents trained in social engineering techniques.

In all cases, the goal is the same: to lower the resistance of the victim through the power of the human voice connection.

Employees, unlike consumers, cannot simply ignore calls from unknown sources, which makes them particularly vulnerable to socially engineered manipulation.

In fact, this recent study showed that more than 37% of vishing attempts actually will succeed at extracting the desired action from unsuspecting human targets. When combined with a phishing email (hybrid phishing/vishing), the success rate rose to 75%.

2022 saw a startling 550% rise in reported enterprise vishing attacks that affected a reported 70% of all organizations, with several factors fueling this sharp acceleration.

First, impostors have broadened their access to the tools of deception thanks to digitalized public sources, unprotected social media accounts, and the vast repository of stolen information found on the Dark Web. Some may add deep fake voice manipulation technology to further their deceit.

And, while the transition from analog calling to Voice over Internet Protocol (VoIP) over the past decade has enabled high quality, low cost, global voice communications and collaboration, it has also super-charged the ability of nefarious criminal agents, using auto-dialers, pre-recorded messages, caller ID spoofing, generous VoIP bandwidth and cheap, untraceable overseas call centers, to reach thousands of intended victims with little effort, expenditure, or risk.

As with other forms of cybercrime, financial reward is the driver behind most vishing attacks. But not always. The Lapsus$ vishing gang, for instance, openly brags about their hacks which have included Uber, Cisco, Microsoft, and others, posting screen grabs on social media as proof and then leaking parts of their stolen data to the press.

While dealing with the financial damages of these attacks, their victims must also deal with the brand damage that results from a public outing of a security breach (because, let’s face it, enterprises are loath to admit they’ve been hacked unless forced to).

In other words, organizations that think they might be able to quietly cover up a data breach are facing the reality, and potential punitive damages, of a new kind of adversary who prefers to publicize, rather than hide, their participation in criminal activity.

So why, with the nearly $172 billion in expenditures put forth by companies to secure their IT infrastructures and digital networks, is the threat of voice phishing so rampant?

The answer is two-fold:

  • Cybercriminals have discovered that humans are far easier to crack than firewalls.
  • Protection of human endpoints from criminal contact via the phone has fallen under the radar of CSOs, whose efforts are primarily directed at data network protection.

There is no one solution. Rather, a multi-pronged approach is required to blunt the threat of voice phishing. There is always a place for additional employee training that raises awareness of this growing attack vector, but as study after study has shown, attempts to modify human behavior provide little defense against these skillful adversaries.

The most meaningful action to take should be one that prevents these callers from reaching their human targets in the first place.

Voice traffic filtering solutions have evolved beyond simple robocall blocking and now include sophisticated call data analytics capabilities designed to detect signs of nefarious activity and deflect those suspect callers away from their intended victims.

These applications do not just reduce disruptions from unwanted calls; they significantly reduce the possibility of cyber-intrusion through a successful vishing scheme. Implementing advanced voice traffic filtering technology should be part of every organization’s cyber-protection strategy in 2023 and beyond.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: Voice Networks are Under Attack
Previous Post

Anonymous Sudan Declares War on American Corporate Giants with DDoS

Next Post

Internet Censorship and Freedom of Speech

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

BreachForums
Cybersecurity News

BreachForums Down After Promoter’s Arrest, Migration Underway Says New Admin

by Chandu Gopalakrishnan
March 20, 2023
fichtner ransomware attack
Data Breach News

Stormous Demands 7 BTC for Stolen Data After the Alleged Fichtner Ransomware Attack

by Editorial
March 20, 2023
US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone
Data Breach News

US cyber attacks 2023: Cybercrime has caused an estimated $6 trillion in damages in 2022 alone

by Ashish Khaitan
March 20, 2023
Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000
Data Breach News

Anonymous Sudan Claims to Sell Stolen Data from the Air France Cyber attack for $3,000

by Editorial
March 20, 2023
Tri Counties Bank cyber attack
Firewall Daily

Tri Counties Bank Cyber Attack: Customers Data At Risk After BlackBasta Ransomware Group Lists It Among Victims

by Ashish Khaitan
March 20, 2023
Next Post
Internet Censorship and Freedom of Speech

Internet Censorship and Freedom of Speech

Latest Issue is Out. Subscribe Now

Women in Cybersecurity

Download Now

CRIL


Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Top 10 Cybersecurity Jobs

Categories

About The Cyber Express

The Cyber Express

Cyber Security News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Events: +1 (678) 578-4140

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

Tel: (678) 578-8838

Events: +1 (678) 578-4140

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cyber Security Magazine
  • Events
    • World CyberCon Middle East 2023
    •  Cyber Security Webinar

© 2022 The Cyber Express (Cyber Security News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.