How to recognize a vishing scam and protect yourself from attack (2024)

The phone rings and a recording says you owe the IRS back taxes and have to share your credit card number to settle the balance. Or it's the bank, warning you that your account has been compromised.

These are just two examples of "vishing," or voice phishing, a popular scam that can take place over a mobile phone or landline. The perpetrator will often pretend to be from a recognizable company or government agency and ask for your credit card, bank account info, Social Security number or other sensitive data.

These attacks are particularly effective because the scammers sound authoritative and urgent. In 2022, victims of vishing scams reported median losses of $1,400, according to the Federal Trade Commission (FTC).

Below, CNBC Select explains how to identify, avoid and recover from vishing attacks.

What we'll cover

  • What is vishing?
  • How to detect a vishing attempt
  • Ways to combat vishing
  • What to do if you've been a victim of vishing
  • Bottom line

What is vishing?

Vishing is a type of cybersecurity attack in which the perpetrator attempts to gain access to sensitive data over the phone. They typically seek financial details or Social Security numbers, but passwords and other data can also be the goal.

Scammers may pretend to be an authority figure — an IRS agent or bank official, for example — and claim there is a time-sensitive matter that requires your immediate attention.

Vishing scams can target individuals or companies: A September 2023 vishing attack on MGM Resorts International cost the casino approximately $100 million.

As opposed to online scams that use malware, vishing schemes rely on social engineering, or psychological tactics to convince victims to take a certain action.

While phone scams have existed for decades, cybersecurity experts say vishing is on the rise, thanks to technological advances like caller ID spoofing and AI-powered software that can mimic specific human voices.

How to detect a vishing attempt

While vishing can take different forms, there are telltale signs that can tip off savvy consumers.

  • A pre-recorded message. Many vishing calls will have an automated message claiming you've won a free prize or that your urgent response is required to prevent a financial penalty.
  • A request for sensitive information. If someone asks for your Social Security number or other personal details, it's a strong sign of a vishing attack. To sound legitimate, they might provide public information, like your birthday or job title.
  • Posing as a government official. Scammers may claim to be from a federal agency, such as the IRS, but legitimate government officials will never call, email or text to ask for money or personal information.
  • Using an aggressive manner. A phone call allows scammers to catch victims off-guard more than an email or letter. Be skeptical of any caller pressuring you to quickly provide sensitive information.

Ways to combat vishing

While vishing is an increasing threat to consumers, there are ways to guard against scammers.

  • Screen your calls carefully. If you don't recognize a number, let it go to voicemail. Some scammers will "spoof" your caller ID into thinking their call is coming from a nearby location or a reputable source. If you want to reply to a voicemail, seek out an official contact number or email and confirm any information they provided.
  • Be suspicious of unsolicited phone calls. If you suspect that a call is a vishing attack, hang up immediately. Don't answer their questions or press any buttons. Don't try to confront them since scammers can record your response to gain access to voice-activated menus.
  • Don't share personal data. Never share passwords, log-in names, driver's license or passport information over the phone. Avoid giving out your Social Security number or other sensitive information over the phone, especially if you didn't originate the call.
  • Get on the National Do Not Call Registry. This free service from the FTC informs marketers that you don't want unsolicited phone calls. While nefarious callers don't abide by the registry, signing up means any unknown caller is less likely to be a legitimate business.
  • Become an AT&T wireless customer. AT&T and TransUnion have partnered on TruContact Branded Call Display, which enables businesses to display their name and logo when calling AT&T customers. That way subscribers can confirm the number has not been illegally spoofed.

Of course, no one is 100% immune from scammers. There are some steps to foil a vishing attack once it's started, like setting up multi-factor authentication on sensitive accounts.

Credit monitoring products can also help you spot if your account or identity has been compromised. CreditWise® from Capital One is a free service that alerts users about changes to their credit history on TransUnion and Experian, including new accounts, delinquencies, balances and hard inquiries.

You'll also be notified about suspicious activity associated with your identity.

CreditWise® from Capital One

Information about CreditWise has been collected independently by Select and has not been reviewed or provided by Capital One prior to publication.

  • Cost

    Free

  • Credit bureaus monitored

    TransUnion and Experian

  • Credit scoring model used

    VantageScore

  • Dark web scan

    Yes

  • Identity insurance

    No

Terms apply.

A paid service, IdentityForce® UltraSecure+Credit reports changes submitted to all three credit reporting agencies. It also offers advanced information and identity monitoring, fraud alerts and $1 million in identity theft insurance.

IdentityForce®

On IdentityForce®'s secure site.

  • Cost

    UltraSecure Individual: $19.90 per month or $199.90 per year; UltraSecure+Credit Individual: $34.90 per month or $349.90 per year; UltraSecure Family: $24.90 per month or $249.90 per year; UltraSecure+Credit Family: $39.90 per month or $399.90 per year

  • Credit bureaus monitored

    3-bureau credit monitoring, alerts and reports: Experian, Equifax and TransUnion®, with UltraSecure+Credit Individual and UltraSecure+Credit Family plans only

  • Credit scoring model used

    VantageScore®3.0, with UltraSecure+Credit Individual and UltraSecure+Credit Family plans only

  • Dark web scan

    Yes, with all plans

  • Identity theft insurance

    Yes, at least $1 million with all plans

Terms apply.

If you've been a victim of a vishing attack

If you suspect you've fallen victim to a vishing scheme:

  • Contact your financial institutions immediately and examine your accounts.
  • Place a security freeze on your credit report
  • Change your passwords, especially for more sensitive accounts.
  • Report any attempted scams to the FTC and FBI.

Subscribe to the CNBC Select Newsletter!

Money matters —so make the most of it. Get expert tips, strategies, news and everything else you need to maximize your money, right to your inbox.Sign up here.

Bottom line

Vishing scammers are developing more advanced strategies every day. It's important to be skeptical of unsolicited phone calls and refrain from sharing personal information over the phone.

Why trust CNBC Select?

At CNBC Select, our mission is to provide our readers with high-quality service journalism and comprehensive consumer advice so they can make informed decisions with their money. Every article is based on rigorous reporting by our team of expert writers and editors with extensive knowledge of financial products. While CNBC Select earns a commission from affiliate partners on many offers and links, we create all our content without input from our commercial team or any outside third parties, and we pride ourselves on our journalistic standards and ethics.

Catch up on CNBC Select's in-depth coverage ofcredit cards,bankingandmoney, and follow us onTikTok,Facebook,InstagramandTwitterto stay up to date.

Read more

How virtual card numbers can help prevent credit card phishing scams

5 scams to watch out for, according to a consumer protection expert

How to tell the difference between legit debt collectors and scam artists

6 signs of a student loan scam

Editorial Note: Opinions, analyses, reviews or recommendations expressed in this article are those of the Select editorial staff’s alone, and have not been reviewed, approved or otherwise endorsed by any third party.

How to recognize a vishing scam and protect yourself from attack (2024)

FAQs

How do you identify vishing? ›

The tell-tale signs of a vishing scam are urgency and fear tactics, unsolicited requests for sensitive info, and poor call quality, to name a few. Recognizing a vishing scam is key to protecting your money and personal information.

What is the red flag for vishing? ›

Vishing attack red flags

Here are a few key signs that you may be dealing with a vishing scammer: The caller requests personal information such as credit card numbers or other sensitive data. The caller pressures you for an immediate response.

What are three ways to avoid becoming a victim of vishing? ›

In summary, below are a few steps that you can implement to prevent yourself from becoming victimized by a vishing attack:
  • Use mobile apps to block callers.
  • Don't pick up the phone.
  • Hang up immediately if the caller sounds suspicious.
  • Verify the caller's identity – obtain name and organization web address.
Mar 17, 2024

Which of these signs can be used to identify a vishing attempt? ›

What are the signs of vishing?
  • Spoofed phone numbers: Vishing scammers often use spoofed phone numbers that appear to be from trusted businesses or institutions, subtly different from the real ones. ...
  • Aggressive call tactics: Vishing and phishing tactics typically incite urgency or fear.

What are the 4 P's of vishing? ›

In order to best prevent fraud, it's important to know and to remember the basic tactics used by scammers. One way is to remember “the four Ps”: Pretend, problem, pressure, pay.

What are real examples of vishing? ›

Vishing attacks examples include:

The fraudster calls the victim saying they are from their bank or another institution and informs them that there is a problem with their account or credit card. The false alert may also arrive by SMS initially, asking the person to call a number to resolve the issue.

What is the difference between phishing and vishing? ›

Phishing uses emails and links, smishing uses text messages or common messaging apps, and vishing uses voice calls and voicemails to obtain sensitive information.

What is vishing and how to prevent it? ›

Vishing Prevention

Never reveal personal data—vishing attacks are designed to trick the target into revealing personal information, which attackers can use for other attacks or fraud. Never give a multi-factor authentication (MFA) number, password, financial data, or similar details over the phone.

What are red flags of possible suspicious activity? ›

Other actions that are considered AML red flags in terms of suspicious transactions include large cash payments, unexplained third-party transactions, the use of multiple accounts, or the use of foreign bank accounts or virtual wallets, especially if they originate from diverse jurisdictions.

Who are often targeted by vishing calls? ›

Once in a call, scammers use social engineering tactics to convince the target to share their personal details. Often, vishing scams target the elderly, new employees, and employees who regularly receive external calls as part of their job.

How common are vishing attacks? ›

According to surveys of working adults and IT professionals conducted in 2023, almost seven in 10 respondents reported having encountered vishing attacks. This represents a slight decrease from 71 percent in the year prior.

What are the best practices for vishing? ›

Spot the signs and avoid vishing
  • Listen for poor audio quality. ...
  • Watch out for calls from unknown numbers or automated calls. ...
  • Be suspicious of callers that request sensitive information. ...
  • Be aware of scare tactics. ...
  • Never share your sensitive or personal information in a received call.
Nov 21, 2023

What would be a vishing attempt? ›

Vishing, short for voice phishing, refers to fraudulent phone calls or voice messages designed to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details.

What does vishing generally happen via? ›

Vishing is performed over the phone using a voice call. This can occur over a landline, cellular network, or a Voice over Internet Protocol (VoIP) system. Phishing, on the other hand, is executed using email.

What are the common tactics used in smishing and vishing attacks? ›

The smisher may use your name and location to address you directly. These details make the message more compelling. The message then displays a link pointing to an attacker-controlled server. The link may lead to a credential phishing site or malware designed to compromise the phone itself.

What is the best description of vishing? ›

Vishing is short for "voice phishing," which involves defrauding people over the phone, enticing them to divulge sensitive information. In this definition of vishing, the attacker attempts to grab the victim's data and use it for their own benefit—typically, to gain a financial advantage.

How is vishing carried out? ›

Vishing, or voice phishing, is a type of phishing attack where scammers use phone calls to trick individuals into revealing personal information, such as passwords or credit card numbers, by pretending to be a legitimate entity. This type of scam can be executed by real humans or via pre-recorded robocalls.

What is vishing also known as? ›

Vishing, short for voice phishing, uses fraudulent phone calls to trick victims into providing sensitive information, like login credentials, credit card numbers, or bank details.

What is vishing and how do you prevent it? ›

Vishing Prevention

Never reveal personal data—vishing attacks are designed to trick the target into revealing personal information, which attackers can use for other attacks or fraud. Never give a multi-factor authentication (MFA) number, password, financial data, or similar details over the phone.

Top Articles
FedEx | System Down
UPS Wrong Dimensions
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Neely Ledner

Last Updated:

Views: 6396

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Neely Ledner

Birthday: 1998-06-09

Address: 443 Barrows Terrace, New Jodyberg, CO 57462-5329

Phone: +2433516856029

Job: Central Legal Facilitator

Hobby: Backpacking, Jogging, Magic, Driving, Macrame, Embroidery, Foraging

Introduction: My name is Neely Ledner, I am a bright, determined, beautiful, adventurous, adventurous, spotless, calm person who loves writing and wants to share my knowledge and understanding with you.