Caller ID spoofing represents a growing problem for organizations and individuals, with more than 13,000 people having been confirmed as victims of government impersonation attempts during 2019 alone. We spoke with Danny Thompson, SVP of market and product strategy at apexanalytix on this threat, who has extensive experience working with large companies to mitigate risks like business email compromise and vishing.

Experts Comments

May 20, 2020
Danny Thompson
SVP of Market and Product Strategy
APEX Analytix
A scammer calls pretending to be from your bank’s fraud department and suggests a fraudulent transaction or fraudulent attempt has been made to intercept a payment. The visher provides just enough information to appear legitimate, for example, they may pick up the name and last 4 digits of a bank account number from a credit card receipt. They may even replace the caller ID with the phone number of the legitimate bank fraud department or customer account maintenance team. Anxiety in the call .....Read More
A scammer calls pretending to be from your bank’s fraud department and suggests a fraudulent transaction or fraudulent attempt has been made to intercept a payment. The visher provides just enough information to appear legitimate, for example, they may pick up the name and last 4 digits of a bank account number from a credit card receipt. They may even replace the caller ID with the phone number of the legitimate bank fraud department or customer account maintenance team. Anxiety in the call recipient is raised by the threat of the reported fraud attempt, and trust in the visher is built by the professionalism of the call, the legitimate information shared and seemingly legitimate caller ID. The last step, then, is for the fraudster to ask for truly private information, like a credit card CVV number or PIN, or the consumer’s real bank account number. This is all that is needed to steal from the call recipient.  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.