Threat Intelligence Directory
Social Engineering
Vishing — IRS or SSA Phone Impersonation
Attack Trigger
Spoofed government caller ID combined with threats of arrest or benefit suspension
What Attackers Want
$500–$25,000 via gift cards, wire transfer, or prepaid debit
How This Attack Works
Attackers call victims using spoofed phone numbers that appear as official IRS or SSA numbers. They claim the victim owes back taxes, has a suspended Social Security number, or faces an active arrest warrant. To avoid arrest or account freeze, the caller demands immediate payment via gift cards, wire transfer, or cryptocurrency. The IRS and SSA never initiate contact by phone with these demands.
Red Flags to Watch For
- ✗IRS and SSA never call to demand immediate payment — they communicate by mail first
- ✗Caller threatens arrest or deportation unless you pay within the hour
- ✗Demands payment via iTunes cards, Google Play cards, or wire transfer
- ✗Refuses to let you hang up and call back the official government number
- ✗Caller already knows your name or partial address to appear credible
- ✗Call comes from a number that matches what appears to be a government agency
How Glance Stops This
- Domain similarity analysis catches lookalike sender addresses at millisecond speed
- SPF / DKIM / DMARC validation flags authentication failures before you ever see the email
- VirusTotal + Google Safe Browsing checks every link in real time
- Urgency language detection scores the email higher for manual review
- Known malicious domain blocklist updated continuously from live scan data
Don't wait to get hit.
Glance scans every incoming email against 12 detection layers — including the exact tactics described above — before it reaches your inbox.
Protect My Inbox — Free