Hacked.com icon

hacked.com

Recovery for SMBs & Individuals

Vishing

Professional realistic concept image for Vishing

Vishing is phishing delivered through phone calls, voicemail, or voice chat. The attacker impersonates a bank, vendor support, IT, or a colleague to extract codes, remote access, or payments.

Why it matters for account recovery

Vishing matters for recovery because attackers often target the control plane: email logins, phone numbers, and verification codes. A convincing voice script can bypass otherwise good security settings.

Common failure modes and misconceptions

  • Calling you on the number you trust: Caller ID can be spoofed. The display name does not prove who is calling.
  • Code and password extraction: Attackers ask for one-time codes, password reset links, or "verification" steps that hand them access.
  • Remote access tools: Support impersonation often aims to get you to install remote control software.

Safe best practices

  • Hang up, then call back using a known number from an official site, card, or app.
  • Do not share one-time codes or recovery links by phone.
  • Treat phone-based urgency as social engineering pressure and switch to a known verification path.

Related terms

Related guides

Vishing is a verification failure. If you make call-back on known numbers normal for high leverage requests, most vishing scripts stop working.