Voice phishing--or "vishing"--is particularly dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering their credit card or account numbers through a phone keypad.
Scammers have begun using the telephone to harvest data for use in identity theft and credit card fraud, and VoIP is making it easier for them to cover their tracks.
Websense Security Labs, San Diego, in June reported a scam that targeted customers of Santa Barbara Bank & Trust with an e-mail alerting them to a supposed problem with their account. Instead of directing them to click on a link, the e-mail listed a phone number for customers to call to verify their identity. When the victim called the number, a fake automated voice response system set up by the scammers asked them to enter their 16-digit account number using the phone keypad.
Earlier this month, a similar scam involving bogus Paypal account security warnings attempted to trick users into providing credit card information via telephone.
Voice phishing—or "vishing"—is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering their credit card or account number through a phone keypad, said Paul Henry, vice president of strategic accounts for security vendor Secure Computing, San Jose, Calif.
"This is really an evolution of phishing and a great example of how social engineering can be used to hack a normal human process," Henry said. Vishing can help criminals obtain detailed credit card data for use in identity theft, such as expiration dates and the three-digit security codes on the back of most credit cards, he added.
Scott Holcomb, CEO of Holcomb Enterprises, a Mission Viejo, Calif.-based solution provider, says VoIP technology gives criminals the anonymity they need to carry out scams. "With regular phones, there's a physical location that has to be reported, but for VoIP, all you need is an IP address," Holcomb said. It's also a simple process to set up a voice response system and acquire local VoIP phone numbers, he said.
Jay Cuthrell, CTO at Digitel, an Atlanta-based solution provider, said when criminals call their victims, they're using VoIP providers to display bogus caller ID information that matches the actual names and numbers of banks and credit card companies. "In some cases, the vishing caller ID could look more professional than what some call centers currently send," Cuthrell said.
However, Jim Wyborny, president of ExpedIT Solutions, a Carrollton, Texas-based solution provider, doesn't think scammers are leveraging VoIP to remain anonymous. "There would be a potential for the same, if not more, tracking if these are actually VoIP phones. There has to be a public IP address out there somewhere pointing to them," he said.
There is very little that can be done from a technology perspective to stop voice phishing, and solutions will have to come from elsewhere, Henry said. "We are going to have to start rethinking within the financial sector how long we can make it easy to establish and use credit. That, to me, is the root cause of the problem," he said.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.