New: Passkey Benchmark 2026 - 8 production KPIs to compare your passkey rolloutcompare your passkey rollout
Back to Overview

What is Vishing? - Protecting Against Voice Phishing

Understand what vishing is, how it differs from phishing, and effective strategies to protect yourself from this type of social engineering attack.

Vincent Delitz
Vincent Delitz

Created: May 17, 2024

Updated: May 12, 2026

Vishing, Short for voice-based Phishing, is a Phishing attack where attackers impersonate other persons or institutions in a phone call.

What is Vishing?#

Vishing (voice-based phishing) is a social engineering attack conducted via telephone, where attackers impersonate other persons or institutions to extract personal information. These attackers often pose as government officials, bank representatives, or tax agents to exploit the trust and authority perceived in these roles.

Using psychological manipulation, they may threaten or deceive victims into disclosing sensitive information, crucial for committing fraud or accessing financial accounts. This form of attack leverages voice communication to increase the urgency and authenticity of the threat, making it a potent variant of phishing.

  • Vishing is voice-based phishing via telephone.
  • Attackers pose as trusted authorities to extract personal data.
  • Commonly involves threats and psychological tactics to coerce action.

Understanding Vishing Attacks#

  • Mechanisms: Vishing calls may use voice-altering software and spoofed caller IDs to seem legitimate, enhancing the scam's credibility.
  • Techniques: Attackers employ tactics such as urgent voicemails or direct calls, claiming severe consequences like arrest or financial loss to elicit quick responses from victims.

Vishing vs. Phishing and Smishing#

  • Phishing: Primarily email-based, uses deceptive emails to steal data.
  • Smishing: Uses SMS texts, often leading victims to malicious websites.
  • Vishing: Involves direct voice calls, creating a more immediate and personal sense of urgency.

Prevalence and Sophistication#

  • Increasing use of deepfake technology allows vishers to clone voices convincingly, making the scams harder to detect.
  • Often combined with other tactics like smishing, enhancing the attack's effectiveness.

Vishing FAQs#

What distinguishes vishing from phishing?#

Vishing uses telephone calls as its medium, while phishing is predominantly through emails, exploiting different aspects of human psychology.

How can one identify and prevent vishing attacks?#

  • Be cautious of unsolicited calls demanding personal information.
  • Verify caller identities by contacting organizations through official channels.
  • Employ caller ID and spam filters to screen potential vishing attempts.

Why is awareness of vishing important?#

Understanding vishing helps individuals and organizations protect sensitive information and prevent financial losses.

What steps can be taken if you suspect a vishing attempt?#

  • Do not engage or provide personal information.
  • Report the incident to relevant authorities and inform your organization's security team.
Corbado

About Corbado

Corbado is the Passkey Intelligence Platform for CIAM teams running consumer authentication at scale. We help you see what IDP logs and generic analytics tools can't: which devices, OS versions, browsers and credential managers support passkeys, why enrollments don't turn into logins, where the WebAuthn flow fails and when an OS / browser update silently breaks login, all without replacing Okta, Auth0, Ping, Cognito or your in-house IDP. Two products: Corbado Observe layers observability for passkeys and any other login method. Corbado Connect adds managed passkeys with analytics built in (alongside your IDP). VicRoads runs passkeys for 5M+ users with Corbado (+80% passkey activation). Talk to a Passkey Expert

See what's really happening in your passkey rollout.

Explore the Console

Share this article


LinkedInTwitterFacebook