A common phone-based scam, vishing involves attackers impersonating trusted individuals or organizations to pressure you into revealing sensitive information. It's part of a broader category of threats that exploit trust rather than technology. This article walks you through what vishing is, how it works, what the most common scam types are, and what steps you can take to protect yourself.
Ugnė Zieniūtė
August 27, 2025
Vishing (voice phishing) is a type of phishing attack carried over the phone. Instead of sending deceptive emails or texts, attackers rely on voice communication. They make unexpected phone calls, pretending to be from the victim's bank, their company's IT department, a government agency, or a family member in trouble.
The goal is always to trick victims into giving away something valuable, which means successful vishing attacks are highly damaging. The types of information scammers want include:
While some vishing attacks involve pre-recorded robocalls, the most damaging scams typically happen in real time, with skilled social engineers creating urgency, fear, or false reassurance to push people into sharing sensitive information.
Most vishing attacks are carefully staged, with the scammer putting in the groundwork to make the call seem legitimate and urgent. They tend to follow a similar pattern:
Some vishing scammers take a more indirect approach. Instead of forcing the action on the first vishing call, they leave a voicemail telling the target to call back about their taxes, insurance claim, or "urgent legal matter." This tactic gives the illusion of legitimacy and buys the scammer more time to build trust.
If you’d like to learn more about similar scams and threats, take a look at our guide on what someone can do with your phone number.
Phone scams have existed for decades, but modern vishing tactics are more personalized and increasingly powered by new technologies. Because many people are cautious about answering unknown numbers, scammers adapt their approach, using urgency, emotional manipulation, or fake voices to bypass suspicion.
Let's look at a few examples of common vishing scams.
As voice synthesis tools become more accessible, scammers are now able to create alarmingly realistic imitations of real people.
Scammers use AI to clone someone's voice — often a family member, friend, or company executive. They create a convincing scenario: a kidnapping, an accident, an urgent wire transfer request. Then they call the victim using this fake voice and try to obtain money or sensitive data.
In 2019, an executive at a UK-based energy firm received a phone call from someone he believed was the CEO of the company's German parent organization. The caller, speaking with a familiar accent and tone, urgently requested a $243,000 transfer to a supplier in Hungary, assuring it would be reimbursed. The executive complied, only to later learn that the voice had been artificially generated using AI.
Robocalls may feel like a nuisance from the past, but they're still widely used in modern vishing schemes.
Attackers use robocalling systems to blast thousands of automated calls per hour to potential victims. Many use VoIP (voice over IP) tech to reduce the cost of vishing attacks and impede detection by law enforcement agencies. Victims are often told to "press 1 to speak with a representative" or receive fake warnings about their account being compromised.
A 2022 FTC report estimated Americans lost over $1.2 billion to robocall scams, with VoIP-enabled calls making up the majority. In one widely reported scam, a robocall claims to be from Apple Support, saying the user's iCloud account has been breached. Pressing "1" connects them to a scammer who harvests their credentials.
Most people check caller ID before picking up the phone, but that's no longer a reliable safeguard. Scammers can easily fake the caller ID number.
Using widely available spoofing tools, scammers manipulate the caller ID so it looks like the call is coming from a familiar or trusted source. It could be your employer's switchboard, a customer support line, or a number already saved in your contacts.
In 2024, a woman in Illinois received calls where the caller ID displayed her bank's real phone number. The scammers convinced her they were stopping fraudulent transactions, and by tricking her into reading out authentication codes sent to her phone, they gained access to her account and stole $2,000 via the bank's Zelle payment system.
Technical support scams remain one of the most persistent types of vishing attacks. They often target older people and rely on the fear of viruses, hacked accounts, or broken software to push potential victims into quick decisions.
The potential victim is told that their computer or device is infected with a virus or suffers from some other issue. The caller offers to fix it (often for a fee) and asks their target to download remote access software. Once connected, the attacker can steal data, install malware, or demand payment to "unlock" the device.
In 2020, a Florida resident reportedly lost $16,000 after answering a call from someone posing as Apple Support. The scammer gained remote access to the victim's computer and used their personal data to facilitate the theft.
One of the most effective vishing tactics is impersonating authority figures. These scams often target people who are already anxious about taxes, benefits, or fraud alerts and exploit their fears to manipulate them into revealing their private data.
Scammers may claim to represent government agencies, such as the Social Security Administration, the FBI, or Medicare, or financial institutions, like banks and credit card companies. They often say there's a problem with the target’s account or a legal issue that needs immediate attention.
To fix that problem, the caller asks the target for personal or financial information, like their account number or login credentials. Some scammers also send text messages before or after the call to make the request seem more legitimate.
In 2025, a Delhi-based individual received a call from someone posing as a bank representative. The caller claimed a check had bounced and offered to help "verify" the check images by sending a WhatsApp link. The scammers gained access to the target’s accounts and prematurely closed two fixed deposits, stealing around $13,000.
Scammers often take advantage of times when people are eager to help. In the wake of natural disasters or major crises, legitimate relief efforts ramp up quickly, and so do fake ones.
Following events like hurricanes, wildfires, or humanitarian emergencies, scammers pose as charity workers or representatives of organizations such as the Red Cross or UNICEF. They typically reach out by phone but may also send text messages or show up in person.
The appeal is always urgent because funds are needed now to help those affected, provide shelter, or supply medical aid. To make the scam more convincing, they may spoof caller IDs, provide fake websites, or use names and logos of real charities.
After Hurricane Ian struck in 2022, the FBI's Columbia field office in South Carolina issued a public warning about a rise in disaster-related fraud. Scammers were contacting residents by phone, text, or door-to-door, posing as volunteers and soliciting donations that never reached real relief organizations.
Everyone likes the idea of a lucky break: winning a car, a vacation, or a cash prize. Scammers know this and use it to their advantage.
Victims are told that they've won a prize but need to pay a processing fee or verify their identity to claim it. Sometimes, scammers ask for their victims’ bank account details to "deposit" the winnings, then use this information to steal money instead.
Attorneys in San Diego prosecuted a sweepstakes fraud operation that duped multiple seniors into paying supposed "release fees" for non-existent prizes. The scam spanned from 2020 to 2022 and cost 22 victims over $395,000.
CEO scams exploit authority and urgency. This type of fraud is especially dangerous in larger organizations because not every employee personally knows the senior leadership.
An attacker poses as an executive and contacts an employee in finance, HR, or IT with a time-sensitive request, usually involving a wire transfer, payroll change, vendor payment, or sensitive document. The caller may spoof the executive's number or follow up with messages that appear to come from a legitimate company email or messaging platform.
In a high-profile attack, a Hong Kong-based employee in a multinational company received a deepfake video call that looked and sounded like the CFO of the company's European headquarters. He ended up authorizing 15 payments totaling $25 million. The attacker used a pre-recorded AI video with a script matching known company procedures.
Vishing works because it feels personal. The caller sounds confident, the story is urgent, and the pressure to act quickly leaves little room to think. But even the most convincing vishing scams tend to follow common patterns, and learning to recognize them is your strongest line of defense.
These are some of the red flags that often signal phone scams:
While vishing attacks are evolving, staying protected is entirely possible. You just need to know what to look out for and how to respond when something doesn't feel right. Follow these practical steps to prevent vishing attacks:
Ugnė is a content manager focused on cybersecurity topics such as identity theft, online privacy, and fraud prevention. She works to make digital safety easy to understand and act on.
The credit scores provided are based on the VantageScore 3.0® credit score by TransUnion® model. Lenders use a variety of credit scores and may utilize a different scoring model from VantageScore 3.0® credit score to assess your creditworthiness.
You have numerous rights under the FCRA, including the right to dispute inaccurate information in your credit report(s). Consumer reporting agencies are required to investigate and respond to your dispute but are not obligated to change or remove accurate information that is reported in compliance with applicable law. While this plan can provide you assistance in filing a dispute, the FCRA allows you to file a dispute for free with a consumer reporting agency without the assistance of a third party.
No single product can fully prevent identity theft or monitor every single transaction.
Some features may require authentication and a valid Social Security Number to activate. To access credit reports, scores, and/or credit monitoring services (“Credit Monitoring Services”), you must successfully pass your identity authentication with TransUnion®, and your VantageScore 3.0® credit score file must contain sufficient credit history information. If either of these requirements is not met, you will not be able to access our Credit Monitoring Services. It may take a few days for credit monitoring to start after a successful enrollment.
NordProtect's dark web monitoring service scans various sources where users' compromised personal information is suspected of being published or leaked, with new sources added frequently. However, there is no guarantee that NordProtect will locate and monitor every possible site or directory where consumers' compromised personal information is leaked or published. Accordingly, we may not be able to notify you of all your personal information that may have been compromised.
Identity and cyber protection benefits are available to customers residing in the U.S., including U.S. territories and the District of Columbia, with the exception of residents of New York and Washington. Benefits under the Master Policy are issued and covered by HSB Specialty Insurance Company. You can find further details and exclusions in the summary of benefits.
Our identity theft restoration service is part of a comprehensive identity theft recovery package that offers a reimbursement of up to $1 million for identity recovery expenses. To access the support of an identity restoration case manager, you must file a claim with HSB, which NordProtect has partnered with to provide the coverage. HSB is a global specialty insurance company and one of the largest cyber insurance writers in the U.S.