- Cybersecurity:Attack and Defense Strategies
- Yuri Diogenes Erdal Ozkaya
- 202字
- 2021-06-30 19:15:59
Phone phishing (vishing)
This is a unique type of phishing where the attacker uses phone calls instead of emails. It is an advanced level of a phishing attack whereby the attacker will use an illegitimate interactive voice response system that sounds exactly like the ones used by banks, service providers, and so on. This attack is mostly used as an extension of the email phishing attack to make a target reveal secret information. A toll-free number is normally provided, which when called leads the target to the rogue interactive voice response system. The target will be prompted by the system to give out some verification information. It is normal for the system to reject input that a target gives so as to ensure that several PINs are disclosed. This is enough for the attackers to proceed and steal money from a target, be it a person or an organization. In extreme cases, a target will be forwarded to a fake customer care agent to assist with failed login attempts. The fake agent will continue questioning the target, gaining even more sensitive information.
The following diagram shows a scenario in which a hacker uses phishing to obtain the login credentials of a user:

- FreeRTOS實時內(nèi)核應(yīng)用指南
- 高性能Linux服務(wù)器構(gòu)建實戰(zhàn):運維監(jiān)控、性能調(diào)優(yōu)與集群應(yīng)用
- 嵌入式實時操作系統(tǒng):RT-Thread設(shè)計與實現(xiàn)
- INSTANT Migration from Windows Server 2008 and 2008 R2 to 2012 How-to
- Windows Server 2012網(wǎng)絡(luò)操作系統(tǒng)項目教程(第4版)
- Fedora 12 Linux應(yīng)用基礎(chǔ)
- Django Project Blueprints
- INSTANT Galleria Howto
- Kali Linux高級滲透測試(原書第3版)
- Linux網(wǎng)絡(luò)操作系統(tǒng)項目教程(RHEL 7.4/CentOS 7.4)(第3版)(微課版)
- Zabbix監(jiān)控系統(tǒng)之深度解析和實踐
- Getting Started with UDK
- 完美應(yīng)用Ubuntu(第4版)
- Selenium Framework Design in Data-Driven Testing
- Linux應(yīng)用大全 服務(wù)器架設(shè)