|
Phone calls feel personal and urgent — which is exactly why criminals use them. With VoIP, attackers have cheaper, easier ways to impersonate suppliers, spoof numbers, and launch voice-based scams that fool even experienced staff. Vishing (voice phishing) and related tactics now sit alongside email phishing as a top risk for businesses.
This article explains how criminals use VoIP to trick teams, what the consequences look like for Australian businesses, and a clear, practical playbook of technical controls, processes and staff behaviours that block those attacks. Table of Contents
1. What is vishing and why VoIP makes it easier Vishing is voice-based social engineering where attackers use phone calls to trick people into revealing credentials, transferring money, or approving changes. VoIP lowers the barrier for attackers because it:
2. Common vishing techniques used against businesses Caller ID spoofing Attackers falsify the displayed number so a call looks like it’s coming from a bank, supplier, government agency, or even your CEO. Impersonation of suppliers or IT“ Hi—this is Telco Support / Xero / your cloud provider—there’s an issue with your account.” The aim is to get credentials, MFA codes, or permission to change settings. Invoice and payment scams Caller claims an invoice is overdue and requests an immediate transfer to a “new” bank account. When combined with an email invoice, the scam looks legitimate. Callback scams A phishing email asks the recipient to call a number. When they do, the attacker uses social engineering to extract details or authorise payments. Voicemail and missed-call traps Automated messages ask staff to call back or press a number to confirm a delivery—used to harvest responses or confirm active numbers for follow-ups. Deepfake and AI voice impersonation Rising risk: attackers can synthesize a manager’s voice to order payments or change banking details. It’s rare today but growing more accessible. 3. Real risks and business impacts (Australian context)
4. Detection signals — how to spot a fraudulent call Train staff to look for quick, observable signs:
5. Practical technical controls to reduce risk Enforce TLS + SRTP Encrypt signalling and media so attackers can’t easily intercept or replay sessions. Use a Session Border Controller (SBC) SBCs hide internal addressing, filter malformed SIP traffic, and provide an extra layer against spoofing and DDoS. Deploy spam SIP/robocall filtering Block known bad IPs and use reputation-based SIP filters to drop obvious bot traffic. Restrict outbound destinations and set spend caps Block international destinations you never call; set hard monthly or per-extension spend limits to stop toll fraud from running up big bills. Require strong auth and 2FA for admin access Admin portals are a prime target—lock them down with multi-factor and IP restrictions. Monitor and alert on anomalies Alert on bursts of outbound calls, high-cost destinations, or many failed authentication attempts. Harden device configurations and update firmware Disable default accounts, remove unused services, and patch regularly. Use CDR/recording retention & audit trails Maintain logs so you can quickly review what happened after a suspicious event. 6. Operational controls and staff processes (including scripts) Technical controls will help, but the human layer is the one attackers exploit. Combine technology with clear processes. Verification protocol (3-step script staff can use)
Thank you—our policy requires we confirm any change to payment details. I’ll call back on the number listed on your invoice. Please expect a verification call shortly.” Segregation of duties for payments Require two people to approve payment changes: one to verify and one to execute. Daily briefing & micro-training 5–10 minute refreshers before busy periods (payroll, EOFY) highlighting common scams and any new threats. Locked changes for telephony admin Changes to trunks, routing, or PINs must be authorised by at least two identified admins and logged. 7. Incident response: what to do if a call is suspicious or successfulIf you suspect an attack:
8. FAQs Q: Can caller ID be fully trusted? No. Caller ID can be spoofed. Treat it as an indicator, not proof. Always verify independently for sensitive requests. Q: Are mobile VoIP apps safer than regular mobile calls? They can be — if they use TLS/SRTP, enforced device management, and VPNs. But the app is only as secure as the phone and network it runs on. Q: Will blocking international calls stop vishing? It reduces a large class of fraud (toll scams) but won’t stop targeted social-engineering calls that use local numbers or impersonate local suppliers. Q: How real is the deepfake voice risk? It’s real and growing. Combine voice verification with out-of-band checks (call-backs, written confirmations) for high-risk transactions. Conclusion Vishing uses human trust as its entry point. VoIP makes the attacker’s job easier, but most successful attacks still come down to a few predictable failures: weak verification processes, default credentials, permissive outbound rules, and lack of basic monitoring. Fix the basics first: enforce encryption and 2FA, limit what extensions can do, monitor for odd patterns, and teach staff a simple verification script to use every time a caller asks for money, credentials, or configuration changes. Those measures will stop most attackers before they get in. If you want help testing your VoIP setup for these risks or rolling out staff training and protective controls, contact us and we’ll run a practical security check tailored to your business. Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2025
Categories |
VoIP Systems
|
Products
|
Quick Links
|
Contact usWe service Australia wide Sydney - Melbourne - Brisbane
Phone:
0414352401 |
22/9/2025
0 Comments