Vishing, New Tricks Fraud Via Phone

Posted by ABY MAULANA RAMADHAN | 2:01 PM | | 1 comments »

May have heard a lot about 'phishing', which is designed to steal money from the web users, but now with more sophisticated criminal uses another name for the same crime committed, ie, 'vishing'. Last week, the Federal Trade Commission has put a claim against two telemarketing companies in Florida and one company that sells automobile warranty for the Do Not Call register and crimes committed since 2007, ie, by making 1 million calls to make money more than $ 10 billion.

The three companies have been stealing the phone number and use it to hide the identity of the consumer and the authorized legal authorities. The case, called vishing attack, in which network the phone is used to deceive people in order to get money. Vishing is a social engineering techniques to steal information or money from consumers using the telephone network. Term is present in the combination between the 'voice' and 'phishing'.

Fraud using a telephone network, this is quite easy to do, that is, using the technology VoIP (Voice over IP). Traditional telephone network, working with the connecting the circuit to another circuit. Each circuit is for a phone number by the phone company, so to change the phone number the caller is difficult. However, with VoIP, there is no circuit, because the service using the Internet, the devices each with a different IP address that is different also, not with the phone number. Phone numbers from VoIP service can also be arranged by the users themselves, including the area code and prefix number, so that the user can hide the user from which to call.

Technically, the attacker using a technique called fraud phone number to make calls as if coming from a legitimate person or phone number that is known by the victim. Similar to engineering through email scams, where an email address that looks like coming from a known email address. Such as phishing attacks that drive consumers online to a phone in the website, the victims are usually tricked vishing recorded message from the attacker and then be to call the toll-free number or a toll-free service. Then the customer in the requested information on a credit card number or other personal information, or the user can also be persuaded to buy counterfeit goods with a high price.

Related Posts by Categories


  1. Tutorial Photoshop // May 20, 2009 at 6:05 PM  

    Nice POst (^_^)..he..3x

Post a Comment


ss_blog_claim=22387b05730b245ec746bdae3ac95a19 ss_blog_claim=22387b05730b245ec746bdae3ac95a19