Subscribe to GEN
Login to GEN
Add a Comment
As organisations become increasingly adept at identifying and blocking email-based phishing attempts, cybercriminals are shifting their tactics towards more direct approaches. Voice-based social engineering, often referred to as "vishing", has emerged as a particularly effective method of gaining unauthorised access to corporate networks. At GEN, we recently conducted a controlled test with seven of our customers' permission, calling from an unknown number and posing as IT support staff. The results were concerning: we successfully obtained remote access to three companies' systems with some effort, while one organisation granted access without any challenge whatsoever.
This shift in tactics represents a significant evolution in the threat landscape, and in 2025 we're seeing a sudden and significant increase in scam calls hitting businesses in the UK. Whilst email security tools can scan for malicious links and attachments, human psychology remains remarkably vulnerable to authoritative voices claiming to be from internal departments. The perceived urgency of IT issues, combined with a general reluctance to question authority figures, creates a perfect environment for these attacks to succeed. Our test demonstrated that even organisations with robust email security measures can fall victim to a well-executed voice call.
The implications of granting remote access to malicious actors are severe and far-reaching. Once installed, remote access software provides complete control over the compromised device, allowing attackers to install additional malware, access sensitive documents, capture keystrokes, and potentially move laterally through the network. In essence, the organisation's entire digital infrastructure becomes compromised through a single successful social engineering call. Financial data, intellectual property, and customer information all become accessible to the attacker.
What makes these attacks particularly dangerous is their psychological sophistication. Attackers often research their targets thoroughly, gathering information from company websites, social media profiles, and even previous data breaches. They then use this intelligence to create convincing personas, often claiming to be responding to a reported issue or conducting routine maintenance. The pressure to resolve IT problems quickly, especially when they appear to impact productivity, frequently overrides security concerns among employees who simply want to get on with their work.
With very greatful permission from one of our successful penetrations, and changing names and links, we'd like to share a call transcript.
And there it is, 9 minutes is all it took to persuade Sally (not her real name) to install malware and give us full access. It is important to note that the 'support' tool we had them download is not real, the website and the 'tool' it downloads were constructed by our development teams for this exercise, and upon installation it simply makes a https request back to one of our development sites with the code entered to show the installation succeeded. At no point did we actually install any remote access software.
A well configured RMM tool would have obstructed us to some degree but we'd be able to work around it with more effort, and in the real world we rarely see 'properly' configured RMM because the restrictions needed to fully protect windows endpoints generate far too much traffic to the IT department.
Comprehensive staff training remains the most effective defence against these sophisticated social engineering attempts. Employees at all levels should be educated about verification protocols before granting system access or installing software. In most cases, IT should never call up and ask anyone to install anything and that's easy to educate. Regular simulated attacks, like the one we conducted, can identify vulnerabilities in your human firewall before real attackers exploit them. We do provide this as a service, but it is just as easy for you to do it yourself.
Technical controls also play a crucial role in mitigating these risks. Implementing strict software installation policies, requiring administrative approval for new applications, and utilising application whitelisting can prevent unauthorised remote access tools from being installed, and a whole bunch of other things far outside the scope of this article.
We've observed cases where initial contact via phone is followed by emails containing "required" software, lending legitimacy to the attack, and intelligence gathered is further leveraged to extend the attack to other users.
Some sophisticated campaigns even involve multiple calls over several days, emails and even a site visit or two, building rapport before dropping the malware bomb. This patient approach significantly increases success rates because the attackers become familiar and 'normal'. In one exercise we carried out a few years ago now we delivered 6 vending machines to a select few customers, placing them inside secure areas without challenge - because, no one sees a vending machine as a threat, when infact our vendors contained NUCs with wifi, phone home and remote access.
Challenge everything, suspect anyone new, and asses risk at all points.
GEN Developed a tool in 2020 which takes the daily call recordings, converts those to transcripts and then uses machine learning to scan those transcripts for anything which might be a social engineering attack. The same system can identify potential data leaks, abuse, and fraud. If you'd like to hear more, contact us for a demonstration.
As we move forward, organisations must adopt a holistic approach to security that addresses both technical vulnerabilities and human factors. Regular security awareness training, clear escalation procedures for unusual requests, and a culture that rewards security-conscious behaviour rather than punishing it will be essential. The most secure organisations aren't necessarily those with the most advanced technical controls, but rather those that have successfully integrated security awareness into their corporate culture.
The test we conducted serves as a stark reminder that cybersecurity is not merely a technical challenge but fundamentally a human one.
--- This content is not legal or financial advice & Solely the opinions of the author ---