Voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit card or account numbers via the phone keypad.
Scammers have begun using the telephone to harvest data for use in identity theft and credit card fraud, and voice-over-IP is making it easier for them to cover their tracks.
Websense Security Labs last month reported a scam that targeted customers of Santa Barbara Bank & Trust with an e-mail alerting them to a supposed problem with their account. Instead of directing customers to click on a link, the e-mail listed a phone number for customers to call to verify their identity. When victims called the number, an automated voice-response system asked them to enter their 16-digit account numbers using the phone keypad.
And in early July, a similar scam involving bogus Paypal account security warnings attempted to trick users into providing credit card information via telephone.
Paul Henry, vice president of strategic accounts at Secure Computing, a San Jose, Calif.-based security solution provider, said voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit-card or account numbers via the phone keypad.
"This is really an evolution of phishing and a great example of how social engineering can be used to hack a normal human process," Henry said.
Voice phishing, or "vishing," can help criminals obtain detailed credit-card data such as the expiration date and the security code located on the back of the card, he added.
Scott Holcomb, CEO of Holcomb Enterprises, a Mission Viejo, Calif.-based solution provider, said VoIP technology gives criminals the anonymity they need to carry out scams.
"With regular phones, there's a physical location that has to be reported. But for VoIP, all you need is an IP address," Holcomb said. It's also a simple process to set up a voice response system and acquire local VoIP phone numbers, he added.
Voice phishing will be difficult to keep in check because hackers already have figured out how to spoof caller ID for VoIP calls, according to Henry. "Someone could call you and forge caller ID to make it appear that the call was coming from a bank, for example," he said.
"There is very little if anything that can be done from a technology perspective [to stop voice phishing]," Henry added. "So we are going to have to start rethinking within the financial sector how long we can make it easy to establish and use credit. That, to me, is the root cause of the problem."
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
InformationWeek Tech Digest, Nov. 10, 2014Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?