#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News

Voice Phishing | Breaking Cybersecurity News | The Hacker News

Category — Voice Phishing
Deepfake Defense in the Age of AI

Deepfake Defense in the Age of AI

May 13, 2025 AI Security / Zero Trust
The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large language models (LLMs) to impersonate trusted individuals and automate these social engineering tactics at scale.  Let's review the status of these rising attacks, what's fueling them, and how to actually prevent, not detect, them.  The Most Powerful Person on the Call Might Not Be Real Recent threat intelligence reports highlight the growing sophistication and prevalence of AI-driven attacks: Voice Phishing Surge: According to CrowdStrike's 2025 Global Threat Report , there was a 442% increase in voice phishing (vishing) attacks between the first and second halves of 2024, driven by AI-generated phishing and impersonation tactics. Social Engineering Prevalence: Verizon's 2025 Data Breach Investigations Report indicates that social engineering remains a top pattern in breaches, with phishing and pretexting accounting for a significant portion of inc...
Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic Routing

Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic Routing

Jul 07, 2023 Mobile Security / Malware
Researchers have issued a warning about an emerging and advanced form of voice phishing ( vishing ) known as " Letscall ." This technique is currently targeting individuals in South Korea. The criminals behind "Letscall" employ a multi-step attack to deceive victims into downloading malicious apps from a counterfeit Google Play Store website. Once the malicious software is installed, it redirects incoming calls to a call center under the control of the criminals. Trained operators posing as bank employees then extract sensitive information from unsuspecting victims. To facilitate the routing of voice traffic, "Letscall" utilizes cutting-edge technologies such as voice over IP (VOIP) and WebRTC. It also makes use of Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols, including Google STUN servers, to ensure high-quality phone or video calls and bypass NAT and firewall restrictions. The "Letscall...
Expert Insights Articles Videos
Cybersecurity Resources