{"id":23204,"date":"2022-05-25T09:39:04","date_gmt":"2022-05-25T13:39:04","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=23204"},"modified":"2022-05-25T09:48:25","modified_gmt":"2022-05-25T13:48:25","slug":"voice-phishing-skyrockets-550-over-the-past-12-months","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/voice-phishing-skyrockets-550-over-the-past-12-months\/","title":{"rendered":"Voice Phishing Skyrockets 550% Over The Past 12 Months"},"content":{"rendered":"<p id=\"arIndex_0\" data-ar-index=\"0\">According to the Quarterly Threat Trends &amp; Intelligence Report co-authored by Agari and PhishLabs, voice phishing has increased by 550% in the last 12 months.<\/p>\n<p id=\"arIndex_1\" data-ar-index=\"1\">The report found that voice phishing has overtaken business email compromise (BEC) as the second most frequently reported response-based email threat since the third quarter of 2021.<\/p>\n<p id=\"arIndex_2\" data-ar-index=\"2\">Emails classified as potentially harmful by employees rose to a rate of 18.3% from 2021 to 2022. These malicious emails were broken down into the following threat vectors by percentage. This include attempted credential theft (58.7%), response-based attacks (37.5%), and Malware delivery attempts (3.7%).<\/p>\n<p id=\"arIndex_3\" data-ar-index=\"3\">Voice phishing in this case fell under the umbrella of response-based attacks, only second only to 419 types of attacks. These 419 attacks accounted for the majority of the attacks logged as response-based schemes at 54.1% of the malicious emails received. BEC came third behind voice phishing attempts with 12.8% of the emails received.<\/p>\n<p id=\"arIndex_4\" data-ar-index=\"4\">\u201cHybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022. We are seeing an increase in threat actors moving away from standard voice phishing campaigns to initiating multi-stage malicious email attacks. In these campaigns, actors use a callback number within the body of the email as a lure, then rely on social engineering and impersonation to trick the victim into calling and interacting with a fake representative,\u201d said John LaCour, principal strategist at HelpSystems.<\/p>\n<p data-ar-index=\"5\">The sources for this piece include an article in <a href=\"https:\/\/www.techrepublic.com\/article\/voice-phishing-attacks-reach-all-time-high\/\" target=\"_blank\" rel=\"noopener\">TechRepublic<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Quarterly Threat Trends &amp; Intelligence Report co-authored by Agari and PhishLabs, voice phishing has increased by 550% in the last 12 months. The report found that voice phishing has overtaken business email compromise (BEC) as the second most frequently reported response-based email threat since the third quarter of 2021. Emails classified as [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[57,16,28,9],"tags":[388,393],"class_list":["post-23204","post","type-post","status-publish","format-standard","hentry","category-companies","category-security","category-software","category-todays-news","tag-privacy-security","tag-security-strategies"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=23204"}],"version-history":[{"count":3,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23204\/revisions"}],"predecessor-version":[{"id":23211,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/23204\/revisions\/23211"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=23204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=23204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=23204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}