Voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit card or account numbers via the phone keypad.
Scammers have begun using the telephone to harvest data for use in identity theft and credit card fraud, and voice-over-IP is making it easier for them to cover their tracks.
Websense Security Labs last month reported a scam that targeted customers of Santa Barbara Bank & Trust with an e-mail alerting them to a supposed problem with their account. Instead of directing customers to click on a link, the e-mail listed a phone number for customers to call to verify their identity. When victims called the number, an automated voice-response system asked them to enter their 16-digit account numbers using the phone keypad.
And in early July, a similar scam involving bogus Paypal account security warnings attempted to trick users into providing credit card information via telephone.
Paul Henry, vice president of strategic accounts at Secure Computing, a San Jose, Calif.-based security solution provider, said voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit-card or account numbers via the phone keypad.
"This is really an evolution of phishing and a great example of how social engineering can be used to hack a normal human process," Henry said.
Voice phishing, or "vishing," can help criminals obtain detailed credit-card data such as the expiration date and the security code located on the back of the card, he added.
Scott Holcomb, CEO of Holcomb Enterprises, a Mission Viejo, Calif.-based solution provider, said VoIP technology gives criminals the anonymity they need to carry out scams.
"With regular phones, there's a physical location that has to be reported. But for VoIP, all you need is an IP address," Holcomb said. It's also a simple process to set up a voice response system and acquire local VoIP phone numbers, he added.
Voice phishing will be difficult to keep in check because hackers already have figured out how to spoof caller ID for VoIP calls, according to Henry. "Someone could call you and forge caller ID to make it appear that the call was coming from a bank, for example," he said.
"There is very little if anything that can be done from a technology perspective [to stop voice phishing]," Henry added. "So we are going to have to start rethinking within the financial sector how long we can make it easy to establish and use credit. That, to me, is the root cause of the problem."
IT's Reputation: What the Data SaysInformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business really views IT's performance in delivering services - and, more important, powering innovation. Our results suggest IT leaders should worry less about whether they're getting enough resources and more about the relationships they have with business unit peers.
What The Business Really Thinks Of IT: 3 Hard TruthsThey say perception is reality. If so, many in-house IT departments have reason to worry. InformationWeek's IT Perception Survey seeks to quantify how IT thinks it's doing versus how the business views IT's performance in delivering services - and, more important, powering innovation. The news isn't great.
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.