Voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit card or account numbers via the phone keypad.
Scammers have begun using the telephone to harvest data for use in identity theft and credit card fraud, and voice-over-IP is making it easier for them to cover their tracks.
Websense Security Labs last month reported a scam that targeted customers of Santa Barbara Bank & Trust with an e-mail alerting them to a supposed problem with their account. Instead of directing customers to click on a link, the e-mail listed a phone number for customers to call to verify their identity. When victims called the number, an automated voice-response system asked them to enter their 16-digit account numbers using the phone keypad.
And in early July, a similar scam involving bogus Paypal account security warnings attempted to trick users into providing credit card information via telephone.
Paul Henry, vice president of strategic accounts at Secure Computing, a San Jose, Calif.-based security solution provider, said voice phishing is dangerous because although most Internet users won't click on a URL in an e-mail, they're quite accustomed to entering credit-card or account numbers via the phone keypad.
"This is really an evolution of phishing and a great example of how social engineering can be used to hack a normal human process," Henry said.
Voice phishing, or "vishing," can help criminals obtain detailed credit-card data such as the expiration date and the security code located on the back of the card, he added.
Scott Holcomb, CEO of Holcomb Enterprises, a Mission Viejo, Calif.-based solution provider, said VoIP technology gives criminals the anonymity they need to carry out scams.
"With regular phones, there's a physical location that has to be reported. But for VoIP, all you need is an IP address," Holcomb said. It's also a simple process to set up a voice response system and acquire local VoIP phone numbers, he added.
Voice phishing will be difficult to keep in check because hackers already have figured out how to spoof caller ID for VoIP calls, according to Henry. "Someone could call you and forge caller ID to make it appear that the call was coming from a bank, for example," he said.
"There is very little if anything that can be done from a technology perspective [to stop voice phishing]," Henry added. "So we are going to have to start rethinking within the financial sector how long we can make it easy to establish and use credit. That, to me, is the root cause of the problem."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.