Voice Phishing is a Growing Social Engineering Threat

KnowBe4 Team | Apr 8, 2026

Voice phishing (vishing) overtook email-based phishing as a top initial intrusion vector in 2025, according to a new report from Mandiant. Notably, vishing is live and interactive, giving the attacker more control over the social engineering objectives.

“While email phishing often relies on volume and opportunistic delivery, interactive methods involve a live person steering the conversation in real-time,” Mandiant says. “This distinction is critical for defenders: interactive attacks are significantly more resilient against automated technical controls and require different detection strategies.”

Vishing was responsible for a high-profile extortion campaign that compromised dozens of organizations’ Salesforce instances throughout 2025. The attackers did not exploit any vulnerability in Salesforce; rather, they called employees and tricked them into granting access.

“One of the more pervasive examples of this activity was a campaign that spanned the first half of 2025, in which UNC6040 used voice phishing to convince targets to provide credentials and authorize an attacker-controlled version of a legitimate software-as-a-service (SaaS) application to access organizations’ data,” the researchers write. “These organizations later received ShinyHunters-branded extortion notes demanding payment for the non-release of stolen data. Given the significant time lapse between the initial data theft activity and the extortion operations, GTIG tracks the extortion activity as UNC6240. Another example of a long-term voice phishing campaign came from UNC3944, a financially motivated threat cluster that has been active since at least early 2022 and overlaps with public reporting on Scattered Spider. UNC3944 targeted help desk staff by impersonating employees requesting password resets and changes to multi-factor authentication (MFA) settings.”

Security awareness training can give your organization an essential layer of defense against social engineering attacks. KnowBe4 enables your workforce to make smarter security decisions every day. Over 65,000 organizations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk.

Mandiant has the story.

FAQs

What is the most common initial infection vector for cyber attacks?

Exploits remained the most common initial infection vector for the sixth consecutive year, accounting for 32% of enterprise intrusions in the M-Trends 2026 report. While vulnerabilities represent a massive technical challenge—with the mean time to exploit dropping to an estimated minus 7 days—the most alarming shift in the data involves social engineering.

Highly interactive voice phishing surged to 11%, becoming the second-most observed vector. Attackers are effectively bypassing automated security controls and multi-factor authentication (MFA) protocols by targeting IT help desks directly. For example, threat groups pose as legitimate employees to reset credentials. This evolution demonstrates that attackers are finding equal success exploiting fundamental human vulnerabilities as they are zero-day exploits.

How is ransomware evolving according to the M-Trends report?

Ransomware has evolved from simple data encryption into systemic recovery denial. According to the M-Trends 2026 report, ransomware operators, including those using REDBIKE and AGENDA, are now actively targeting resilience infrastructure to force organizations into paying the ransom.

Instead of just locking user files, attackers are purposely destroying backups, targeting identity services, and attacking virtualization management planes like hypervisors. For example, attackers exploit virtualization storage layers to simultaneously render all associated virtual machines inoperable. Because they are systematically deleting cloud backups and bypassing guest-level defenses, ransomware is now a fundamental resilience crisis where traditional recovery methods hold less value.

How do threat actors use voice phishing to gain network access?

Threat actors are using highly interactive voice phishing to directly bypass multi-factor authentication (MFA) and gain initial access to software-as-a-service (SaaS) environments. Instead of relying on traditional email phishing—which dropped to just 6% of intrusions—groups like UNC3944 call IT help desks posing as employees to reset credentials.

Once inside, they harvest long-lived OAuth tokens and session cookies. By compromising third-party SaaS vendors, they steal hard-coded keys and personal access tokens, allowing them to seamlessly pivot into downstream customer environments. In practice, organizations must audit SaaS integrations and monitor for anomalous token usage to combat this human-centric invasion method.

What are the main cybersecurity trends in M-Trends 2026?

The primary cybersecurity trends in M-Trends 2026 highlight a clear divergence in adversary pacing. On one hand, cybercriminal groups are optimizing for immediate impact, reducing the "hand-off window" between initial access and secondary payloads to just 22 seconds, and aggressively targeting backups for ransomware recovery denial.

On the other hand, cyber espionage groups and insider threats are prioritizing extreme persistence, achieving median dwell times of 122 days by embedding custom in-memory malware into edge devices and routers. Additionally, voice phishing has overtaken traditional email phishing as a primary infection vector, and early use of AI by attackers to accelerate the attack lifecycle has emerged. To adapt, defenders must expand visibility and pivot toward continuous identity verification.

How do attackers achieve extreme persistence on network edges?

Attackers achieve extreme persistence by specifically targeting edge and core network devices, such as virtual private networks (VPNs) and routers. These devices typically lack standard endpoint detection and response (EDR) agents, creating massive visibility gaps.

M-Trends 2026 highlights threat clusters deploying custom, in-memory malware—such as the BRICKSTORM backdoor—directly onto these non-traditional network appliances. By residing primarily in memory on devices that cannot support traditional security tooling, this malware routinely survives standard remediation efforts and system reboots. Attackers then use native packet-capturing functions to intercept sensitive data and plaintext credentials in transit, allowing them to quietly gather intelligence for hundreds of days without moving deeper into heavily monitored workstations.

What role does AI play in the 2026 cyber threat landscape?

While not the primary cause of breaches in 2025, adversaries are actively integrating AI into their operations to accelerate the attack lifecycle. The M-Trends 2026 report observed malware families like PROMPTFLUX and PROMPTSTEAL querying large language models (LLMs) mid-execution to evade detection.

Additionally, "distillation attacks" are being used to extract proprietary logic from high-value machine learning models. Threat actors are also abusing AI within compromised environments; for example, the QUIETVAULT credential stealer searches machines for local AI command-line tools and executes predefined prompts to harvest configuration files. In practice, organizations should establish behavioral baselines around developer toolchains and adopt robust frameworks to secure their AI implementations.

What is the "hand-off window" in modern cyber attacks?

The "hand-off window" refers to the time it takes for an initial access broker to transfer network access to a secondary threat group that executes the primary attack, such as ransomware.

In the M-Trends 2026 data, this window aggressively collapsed from over 8 hours in 2022 to an astonishingly fast 22 seconds. Initial access partners are increasingly pre-staging the secondary group's preferred malware—or establishing network tunnels—during the very first infection. This means secondary threat actors are fully equipped to launch their high-impact operations the exact moment they log into the network. For defenders, this metric signifies that routine, low-level malware alerts must be treated as critical indicators requiring immediate remediation before interactive operations begin.

How can organizations defend against modern ransomware tactics?

To defend against modern ransomware, organizations must architect their networks with the assumption that attackers will attempt "recovery denial." M-Trends 2026 emphasizes the need to isolate critical control planes. Virtualization and management platforms should be treated as Tier-0 assets with strict, isolated access controls.

Most importantly, to counter the active destruction of backups, environments should be decoupled completely from the corporate Active Directory domain and rely heavily on immutable storage. Organizations must transition from relying on static indicators of compromise to behavioral anomaly detection, flagging abnormal bulk API operations or unauthorized access to edge devices long before modern ransomware can corrupt hypervisor datastores.

Why is continuous identity verification vital for SaaS security?

Continuous identity verification is vital because interactive social engineering and voice phishing effectively bypass static multi-factor authentication (MFA) protocols. According to M-Trends 2026, attackers are actively harvesting long-lived OAuth tokens and session cookies to slide past initial login hurdles entirely.

Once they possess these tokens, they can silently persist in SaaS applications without repeatedly authenticating. By mandating continuous identity verification—enforcing strict least privilege mechanisms, routinely auditing third-party SaaS integrations, and routing all applications through a central Identity Provider (IdP)—organizations can detect anomalies like suspicious token use or abnormal geo-locations, rapidly shutting down access before data exfiltration occurs.


See KnowBe4 Cloud Email Security in Action

Request a personalized demo today to see how KnowBe4's Cloud Email Security products will enhance your email security.

Request a Demo

Topics: Phishing, Cybercrime




Get the latest insights, trends and security news. Subscribe to CyberheistNews.