How to deal with voice phishing
1. Overview
The evolution of voice phishing is scary. These days, calls and texts in the names of family members, as well as cleverly deceitful smishings, come from time to time. In this case, we will describe the countermeasures and prevention methods when voice phishing is good to know.
FSS-made-voice phishing-prevention-banner
Various promotional materials to prevent voice phishing
2. How to prevent voice phishing
2.1 Various Phishing Techniques
2.1.1 Employees of government agencies and financial institutions do not ask for money
There are a lot of cases where voice phishing is done by representative government agencies such as the prosecution, the police, and the Financial Supervisory Service. This is a method of targeting people who believe in government agencies and the mentality that shrinks when they are called government agencies.
For example, impersonating a Financial Supervisory Service employee and claiming that your card is being used illegally (criminal) and that you need to move your balance to a safe place.
2.1.2 Voice phishing if personal information and financial transaction information are requested over the wire
Government agencies and financial companies do not ask for personal information over the wire. If you impersonate an employee of a financial company and ask for your ID photo and financial transaction information, or recommend input to an impersonated site, it is very likely to be voice phishing.
2.1.3 Prohibition of app installation through URLs from unknown sources
You should never click on an ambiguous link, as it is common to trick users into clicking on a link via text to install an app that steals information. You should be careful because it is common to send a link related to courier delivery so that you can click it.
2.2 Proactive measures
2.2.1 Smartphone phone number and spam blocking
To prevent phishing texts from coming in advance, add specific characters and register them as spam, or set all unknown and repeated phishing numbers to spam blocking and call blocking. In addition, blocking messages without a sender ID is also activated to prepare for possible smishing.
2.2.2 Blocking micropayments / Blocking stolen numbers
Apply for mobile phone micropayment blocking and number theft text blocking services to the customer center of the telecommunication company you are using. There is no cost at all, so if there are no special requirements, apply in advance to prepare for damage caused by theft and smishing.
3. When you are voice phishing
3.1 When you get hit by a wire
3.1.1 Application for Suspension of Payment
If you have already transferred or remitted cash due to voice phishing, you should quickly apply to the bank (financial company) to stop the payment. Contact the individual financial company’s call center and promptly say that it is a request for payment suspension due to voice phishing.
3.1.2 Report to the National Police Agency and the Financial Supervisory Service
In the case of direct delivery of cash or other damages caused by voice phishing, report to the National Police Agency 112 or the Financial Supervisory Service 1332.
3.2 When you get hit by a link
3.2.1 Privacy Clean Service
If it is determined that personal information on your smartphone has been stolen, apply for the above service. It is also called a stolen my information search service, and since there is a risk that your information may be misused, the above service is used to prevent subsequent damage.
3.2.2 PC caregiver service in Internet protection country
Access the Internet Protection Nara website created by the Korea Internet & Security Agency (KISA) and apply for the My PC Caregiver service. This is a service where an expert directly checks when there is concern about hacking or information leakage due to the installation of malicious programs. If it is difficult to apply through the website, you can also apply for consultation through the number 1899-3313.
3.2.3 Citizen Conan App
It is a program created to delete apps used as voice phishing in the police academy and can be easily installed and used. Helps detect and delete unwanted malware when it is installed.
4. Concluding the article
Above, I have described everything from countermeasures to preventive measures when voice phishing occurs. As more and more sophisticated voice phishing methods cause a lot of damage, it is important to always be suspicious and have a habit of checking.
like sympathy
Share Manage Posts Subscribe