April 15, 2026 Newsletter
A recent report of voice phishing surge confirms a structural shift in how attackers gain access
Voice phishing (vishing) is now the second most common initial access method
It is the #1 method used in cloud environment breaches
Accounted for ~11% of incident response cases in 2025
Email phishing—long the dominant vector—is declining in effectiveness. Attackers are moving to interactive, human-driven attacks because they bypass static defenses.
This is not an evolution. It is a replacement.
Why Voice Phishing Works (and Scales)
1. Security Controls Are Built for Machines, Not Conversations
Most organizations have hardened email gateways, endpoint protection, and MFA controls. None of these address:
Live persuasion
Real-time decision pressure
Human error under urgency
Voice phishing exploits the one layer that remains largely unprotected: people.
2. Attackers Are Targeting Trust Anchors
Threat actors are no longer casting wide nets. They are targeting:
IT help desks
Identity and access workflows
MFA enrollment processes
Real-world tactic observed:
Attackers call help desks to register attacker-controlled devices for MFA resets
This bypasses:
Password policies
MFA protections
Traditional identity controls
3. AI Has Industrialized Social Engineering
The economics have changed:
AI-driven scams increased over 1,200% in 2025
Deepfake voice attacks rose ~170% in a single quarter
~70% of organizations report exposure to vishing attacks
Attackers now operate with:
Voice cloning
Script automation
Personalized targeting at scale
This removes the skill barrier. Social engineering is now repeatable and scalable.
4. Humans Respond Faster to Voice Than Email
Voice introduces:
Urgency
Authority
Emotional manipulation
Employees are conditioned to:
Help
Resolve quickly
Trust internal-sounding requests
That combination makes voice-based attacks high-conversion entry points.
The New Attack Chain: Identity First, Infrastructure Second
Traditional model:
Exploit vulnerability → gain access → escalate privileges
Current model:
Manipulate human → gain identity access → inherit privileges
This flips the entire security model.
Attackers no longer need:
Zero-days
Exploit chains
Malware delivery
They need convincing conversations.
Where Organizations Are Failing
1. Over-Reliance on Technical Controls
Firewalls, EDR, and scanners do not address:
Help desk manipulation
Identity lifecycle abuse
Human validation gaps
2. Weak Identity Verification Processes
Most organizations lack:
Strong caller verification protocols
Secure MFA reset procedures
Identity challenge standards for support teams
3. No Measurement of Human Risk Exposure
Security programs measure:
Vulnerabilities
Patch SLAs
Detection times
They rarely quantify:
Social engineering exposure
Identity manipulation risk
Help desk exploitability
InfoSight Perspective: This Is an Identity and Risk Visibility Problem
Voice phishing is not just a phishing issue. It is a visibility and prioritization failure.
Organizations cannot defend what they cannot measure.
What This Requires:
1. Quantifying Identity Risk Exposure
Which users can be socially engineered into access?
What systems can be reached via identity compromise?
What is the financial exposure tied to those paths?
2. Testing Real-World Attack Paths
Simulated vishing + help desk compromise scenarios
Red/Purple team exercises focused on identity workflows
Validation of MFA reset and escalation controls
3. Measuring Remediation Effectiveness
Time to detect social engineering attempts
Time to revoke compromised access
Reduction in identity-driven attack surface
4. Moving from Qualitative to Quantitative Risk
Security leaders need to answer:
What is the dollar impact of identity compromise?
How does that risk trend over time?
Which remediation actions reduce it fastest?
Without this, voice phishing remains invisible until it becomes an incident.
What Good Looks Like
Organizations that are adapting are doing three things differently:
1. Treating Identity as the Primary Attack Surface
Not endpoints. Not networks. Identity.
2. Embedding Security Into Human Processes
Help desk verification workflows
MFA enrollment controls
Escalation policies tied to risk
3. Using Continuous Risk Measurement
Exposure tracked over time
Priorities driven by impact, not noise
Reporting aligned to executives and boards
Bottom Line
Voice phishing is succeeding because it exploits a gap most organizations ignore:
Security programs are built for systems.
Attackers are targeting people.
Until organizations:
Quantify identity risk
Validate real-world attack paths
Measure exposure in business terms
They will continue to be vulnerable—regardless of how strong their technical controls appear.
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.
Enter your details below to download the PDF.