Your team finally tightened email security. Then the “IT helpdesk” calls start. Someone sounds calm, competent, and in a hurry. They “just need” an MFA code, a password reset, or a quick screen-share to fix an urgent access issue.
That’s voice phishing, and it’s becoming one of the most effective ways to bypass modern defenses because it targets the human layer, not the firewall.
In early 2026, security reporting highlighted waves of vishing attacks tied to credential theft and SSO account compromise, including campaigns attributed to ShinyHunters that revolve around calling employees and manipulating authentication flows.
Voice phishing (aka vishing) is phishing conducted over phone/VoIP/voice channels - often impersonating IT support, a vendor, or an executive to pressure someone into handing over access.
Why it’s rising:
Attackers can synchronize calls with fake login pages and MFA prompts
Best defenses:
If you’re searching “what is voice phishing” or “what is vishing in cyber security”, here’s the simplest definition:
Unlike email phishing, the weapon is conversation: urgency, authority, empathy, intimidation - whatever gets a person to comply.
Voice phishing isn’t really “new,” but the environment has changed in recent years.
SSO platforms and cloud suites mean one compromised login can open a lot of doors. Recent reporting describes attackers using voice calls to steal SSO credentials and coerce MFA approvals to access SaaS environments.
Some campaigns combine a phone call with a fake login page that updates in real time based on what the victim sees so the attacker can coach them through each step (including MFA prompts) in sync with the call.
Many organizations have excellent email filtering, banners, and playbooks—but fewer have:
CISA’s broader phishing guidance emphasizes breaking the attack cycle early and strengthening user + organizational defenses; not just technical filtering.
If you want a quick “spot the pattern” list, these are the most common attributes:
If it feels like a script designed to keep you moving, it probably is!
A quick aside for the broader keyword “what is cyber security”: cybersecurity is the practice of protecting systems, networks, and data from attacks and unauthorized access.
Voice phishing is a threat because it targets the decision-making layer—the human who can override controls, share secrets, or grant access. That’s why even strong tools can fail if a policy or habit says “be helpful quickly.”
The goal of the call is almost never “conversation.” It’s usually one of these outcomes:
Here’s how a typical voice phishing chain looks in the real world:
The key is that it feels like solving a problem because the attacker is actively coaching the victim through “fixing” it.
The call:
“Hey, this is Mike from IT. We’re seeing a risky sign-in to your account and I need to verify you so I can revoke the session. You’ll get an MFA code—read it to me.”
What the employee does (bad path):
What the employee does (good path):
That “slow down and verify” move is exactly what vishing guidance recommends since attackers rely on speed and emotion.
If you’re a CISO/IT leader building a TOFU-friendly checklist, prevention should be layered:
Limit who can approve sensitive requests (new MFA device enrollment, payroll changes, wire approvals).
Microsoft and CISA both emphasize strengthening authentication and phishing resistance as part of modern identity defense.
This is a common search and the answer is: none.
Voice phishing is primarily social engineering, so many attacks succeed without malware at all. When malware does show up, it’s usually because the caller convinces a victim to:
So instead of hunting for “the one vishing malware,” focus on the control points:
CISA’s phishing guidance is a useful reference for improving organizational response and breaking the cycle early.
Use this as a starting point for your internal playbook:
Jericho Security focuses on AI-powered cybersecurity awareness training, including phishing simulations and an infinitely customizable, comprehensive training library to help teams recognize and respond to modern threats.
If you want to see how vishing-ready training and reporting can look in practice, explore Jericho’s next-gen security awareness training and simulation approach - especially for high-risk roles like IT, finance, and exec assistants.
Q1: What is voice phishing?
Voice phishing is a social engineering attack where scammers use phone/VoIP/voice channels to trick someone into revealing sensitive info or granting access.
Q2: What is vishing in cyber security?
In cybersecurity, vishing is voice phishing - phishing conducted through calls or voice messages to steal credentials, bypass MFA, or trigger harmful actions.
Q3: What does vishing stand for?
Vishing stands for “voice phishing.”
Q4: What are the common attributes of a voice phishing attack?
Authority impersonation, urgency, requests for MFA codes/approvals, channel switching, and pressure to bypass standard helpdesk or verification steps.
Q5: How to prevent voice phishing?
Use call-back procedures, train employees to refuse code/approval requests, harden helpdesk resets, and deploy phishing-resistant MFA for key accounts.
Q6: What malware is always used during voice phishing attacks?
None. Many vishing attacks involve no malware at all. When malware appears, it’s typically installed after the caller persuades the victim to run a tool or click a link.
Q7: Why is voice phishing increasing?
Attackers are targeting identity systems (SSO + MFA) and using real-time coaching with fake login flows to increase success rates.
Q8: Is voice phishing only phone calls?
No. Vishing can include VoIP calls, voice messages, and voice-based approaches inside collaboration tools, depending on what’s normal for your organization.