T 5.135 SPIT and Vishing

The use of VoIP offers many possibilities to obtain information or exploit unwitting users under false pretences. Using VoIP, providers can place unwanted advertising for their products or services, for example. SPIT (Spam over IP Telephone), as well as SPAM, which is already a widespread email phenomenon, costs the receivers time and money. Depending on their frequency, SPIT calls are not only a nuisance, but they can also significantly disrupt work flows in an organisation under some circumstances.

Sending SPIT is relatively inexpensive for a provider. If a packet-based connection can be established to a user over the internet, the provider does not incur any additional telephone costs. By dimensioning the internet connection accordingly, the provider can send numerous advertisements at the same time.

SPIT may just be an advertising slogan, for example. In this case, a recording is played when the person called picks up the phone. This way, products or services can be advertised However, SPIT with fraudulent intentions can also be sent An example of this type of SPIT is Vishing.

Vishing (Voice Phishing) is an attack used to obtain personal information of one or more victims. In this case, a VoIP-based dialler calls a large number of VoIP addresses the attacker has collected. When the call is answered, a voice message is played intended to make the victim believe the call is from a trustworthy organisation, such as the bank where the victim is a customer. During the call, the victim is requested to provide information such as account numbers, PINs, and TANs.

Vishing

The term "Vishing" means "Voice Phishing" or "Phishing via VoIP" and describes the organised theft of data via phone by inciting the users, similarly to Phishing (see T 5.157 Phishing and Pharming), to disclose confidential or financially relevant information by means of well-through stories. Here, both attack preparation and information tapping may be performed via the telephone.

The aim of Vishing is to mislead as many victims as possible and to prompt them to disclose their access data, passwords, credit card information, etc. This way, fraudsters can collect sufficient information in order to debit money from accounts on behalf of the customer: name, credit card and account number, PIN and TAN numbers.

Examples: