On a regular workday — nothing unusual. The phone rings.
“Hi, this is IT support. We’re seeing unusual activity on your account. If we don’t fix this in the next few minutes, you may lose access.”
The voice is calm. Confident. Helpful.
They already know the employee’s name. Their role. Their team.
One short conversation later → Access granted
What didn’t happen:
• No malware was installed
• No vulnerability was exploited
• Nothing was “hacked” in the traditional sense
And yet the breach had already begun.
This isn’t a one-off incident.
The same playbook keeps showing up.
Recently:
— A global casino operator breached after helpdesk reset credentials during a vishing call
— A ride-sharing company compromised when an employee approved access on an authenticator app during a fake “IT emergency”
— A recent university-sector breach where voice-based social engineering bypassed strong technical controls
Different industries. Same technique.
Industry data keeps reinforcing that:
— Many successful breaches involve social engineering.
— Voice attacks (vishing) are rising fast.
Why vishing works so well:
→ It bypasses email security tools entirely
→ It creates urgency and authority
→ It exploits our instinct to be helpful and resolve issues quickly
The lesson:
MFA, EDR, and Zero Trust can fail silently when voice-based phishing bypasses identity verification workflows.
Security programs must evolve beyond phishing emails and awareness slides to include:
→ Phishing-resistant MFA
→ Strong helpdesk identity verification workflows
→ Regular vishing simulations, not just email based phishing tests
Because today, breaches don’t always start with a click.
Sometimes, they start with a phone call impersonating the IT helpdesk and a familiar sentence:
“Hi, this is IT support. We’re seeing an issue on your account....”
Comments
Post a Comment