IsThisAScam
AccueilBlogTarifsÀ ProposHistoryAPIExtension
Upgrade
FR
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produit
  • Home
  • Blog
  • Pricing
  • À Propos
  • History
  • Chrome Extension
Resources
  • Developers
  • Documentation API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Mentions Légales
  • Politique de Confidentialité
  • Conditions d'Utilisation
  • product@zeplik.com

© 2026 Zeplik, Inc. Tous droits réservés.

Built for the calm, the cautious, and the careful.

Home/Glossary/Vishing
Glossary · Attack Vector

What Is Vishing?

A form of phishing conducted over the phone (voice calls), where scammers impersonate legitimate organizations to extract sensitive information, payments, or remote access to devices.

Quick Definition

A form of phishing conducted over the phone (voice calls), where scammers impersonate legitimate organizations to extract sensitive information, payments, or remote access to devices.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Vishing explained.

Vishing, or "voice phishing," exploits the trust and immediacy of phone conversations. Scammers use caller ID spoofing to display legitimate phone numbers, making it appear that the call is genuinely from your bank, the IRS, tech support, or another trusted entity.

The real-time nature of phone calls puts victims under pressure. Unlike emails, which can be analyzed at leisure, phone conversations demand immediate responses, giving victims less time to think critically about what's being asked.

With advances in AI voice cloning, vishing attacks are becoming even more dangerous. Scammers can now clone the voices of family members or colleagues using just a few seconds of audio from social media, making impersonation calls terrifyingly convincing.

02How it works.

01Attacker places a call using spoofed caller ID showing a legitimate organization's number
02They claim to be from your bank, the IRS, tech support, or a government agency
03A crisis is fabricated: fraud on your account, a warrant for your arrest, a virus on your computer
04The caller requests sensitive information, payment via gift cards, or remote access to your device
05Stolen data or funds are used immediately before the victim realizes the deception

03Real-world example.

In 2024, a Hong Kong finance worker was tricked into transferring $25 million after a video call with deepfake versions of the company's CFO and other colleagues. The attackers used AI to clone the faces and voices of real executives.

04How to protect yourself.

01Hang up on unexpected calls claiming to be from your bank or the government, then call the official number
02Never provide passwords, PINs, or one-time codes over the phone
03Remember that government agencies and banks never demand immediate payment by phone
04Be skeptical even if the caller ID shows a legitimate number — it can be spoofed
05Establish a family code word for emergency requests to defeat voice cloning attacks
Related Terms
PhishingSmishingSpoofingDeepfakeSocial Engineering
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →