Threat Intelligence Directory
Social Engineering
Voice Phishing (Vishing) Phone Scam
Attack Trigger
Phone call from a spoofed government, bank, or tech support number demanding action
What Attackers Want
$500–$50,000 via gift cards, wire transfer, or crypto
How This Attack Works
Vishing is phone-based phishing where attackers call victims using spoofed caller ID numbers that appear to be from banks, the IRS, Social Security Administration, or major tech companies. They use fear, urgency, and impersonation to extract personal information, credentials, or direct payments over the phone.
Red Flags to Watch For
- ✗Caller ID shows a government agency or large corporation but the call was unsolicited
- ✗Caller demands payment via gift cards, wire transfer, or cryptocurrency
- ✗Refuses to let you hang up and call back the official number independently
- ✗Threatens arrest, account suspension, or legal action unless you comply now
- ✗Asks you to download remote access software during the call
- ✗Uses your name or partial personal details to seem legitimate
How Glance Stops This
- Domain similarity analysis catches lookalike sender addresses at millisecond speed
- SPF / DKIM / DMARC validation flags authentication failures before you ever see the email
- VirusTotal + Google Safe Browsing checks every link in real time
- Urgency language detection scores the email higher for manual review
- Known malicious domain blocklist updated continuously from live scan data
Don't wait to get hit.
Glance scans every incoming email against 12 detection layers — including the exact tactics described above — before it reaches your inbox.
Protect My Inbox — Free