CyberROI

Cybersecurity Investment Calculator

Social Engineering Beyond Phishing: Vishing, Smishing, and Pretexting

When organisations think about social engineering, phishing emails dominate the conversation. While email phishing remains the most common vector, it is just one technique in a broader category of human-targeted attacks. Attackers increasingly use voice calls, text messages, and elaborate pretexting scenarios to bypass technical controls and exploit human psychology.

Vishing: Voice-Based Social Engineering

Voice phishing (vishing) uses phone calls to manipulate targets into revealing sensitive information or taking harmful actions. Attackers impersonate IT support, bank representatives, government officials, or company executives. The immediacy of a phone conversation creates pressure that email cannot replicate — targets must respond in real time without the opportunity to verify the request.

Vishing has become more dangerous with AI voice cloning technology. Attackers can now generate convincing replicas of known voices using just a few minutes of audio samples sourced from public presentations, social media, or corporate videos. Cases of CEO voice impersonation leading to fraudulent wire transfers have been documented with losses exceeding $200,000.

Smishing: SMS-Based Attacks

SMS phishing (smishing) exploits the trust people place in text messages. Text messages have significantly higher open rates than emails — over 98% compared to approximately 20% for email. Smishing attacks typically impersonate delivery services, banks, or government agencies, directing targets to credential-harvesting websites or malware downloads.

The shorter format of text messages makes it harder for targets to identify suspicious elements. URLs in text messages are often shortened, hiding the actual destination. Mobile devices also provide less security context than desktop browsers, making it easier for fake websites to appear legitimate.

Pretexting: The Art of the Scenario

Pretexting involves creating a fabricated scenario (pretext) to engage a target and extract information or actions. Unlike phishing, which typically uses a single message, pretexting may involve extended interaction over days or weeks, building trust before making the request.

Common pretexts include: a new employee needing system access, an auditor requesting documentation, a vendor needing to verify account details, or a journalist seeking background information. The attacker researches the target and organisation extensively, using publicly available information to make the scenario convincing.

Defending Against the Full Spectrum