Vishing Rises After Qantas

Australia’s Qantas recently addressed a major data breach affecting nearly six million customer records. The breach traced back to vishing-phone-based social engineering-targeting third-party call centers. Qantas’s investigation with federal authorities uncovered that attackers impersonated agents and bypassed authentication controls to access personal data.

This incident highlights the growing trend of voice-driven cyberattacks and exposes vulnerabilities in call center identity verification protocols.

The Rise of Vishing Attacks

Vishing uses phone calls instead of email to manipulate individuals into providing confidential information or access. Key aspects driving its rise include:

  • Weak identity checks at service desks and vendor help lines
  • Use of trusted context and familiar scripting to deceive employees
  • Psychological pressures like urgency and assumed trust that override protocol adherence

Australia’s privacy regulator reports a 46% rise in vishing attempts within government and private sectors. The Scattered Spider ransomware group has leveraged this method to attack airlines globally.

Industries at Greatest Risk

Sectors that rely heavily on voice communication and third-party interactions are most vulnerable:

  • Aviation and Transportation: Airline and travel agency support lines
  • Financial Services: Banking and payment helplines
  • Healthcare: Patient support services and medical inquiries
  • Government Services: Citizen hotlines and verification lines
  • Retail and Utilities: Customer support and incident management centers

Vishing effectively bypasses multi-factor authentication, turning trusted voices into potential breach points.

COE Security’s Recommended Defenses

To counter voice-based phishing threats, organizations need a multi-layered approach:

  1. Strengthen identity verification protocols: Introduce voice biometrics and call-back confirmations
  2. Train employees on social engineering tactics: Use real-world vishing simulations
  3. Monitor call center access and patterns: Detect anomalies in call metadata and login times
  4. Apply zero trust principles to voice channels: Enforce least-privilege access and persistent verification
  5. Assess third-party security hygiene: Audit vendor call center controls and response mechanisms
Conclusion

The Qantas incident shows how effective voice-based cyberattacks can be-especially when human trust outweighs technical defenses. Vishing poses a clear and present danger to any organization relying on voice verification.

By implementing stronger identity validation, conducting targeted training, and monitoring interactions, businesses-from airlines to banks-can significantly reduce their risk and protect sensitive data from sophisticated social engineering threats.

About COE Security

COE Security specializes in protecting industries facing voice-based attack risks, including aviation, healthcare, finance, government, retail, and utilities. Our services include:

  • Voice phishing simulations and secure phone workflow assessment
  • Identity access governance and zero trust implementation
  • Incident response planning for communication-based cyber threats
  • Compliance advisory for ISO 27001, NIST, HIPAA, GDPR, and PCI DSS
  • Security training focused on mitigating vishing and social engineering risks

We empower organizations to turn human vulnerabilities into strengths, ensuring secure operations, regulatory compliance, and resilient customer trust.

Follow COE Security on LinkedIn for insights on defending against evolving social engineering threats and building robust cybersecurity programs.

Click to read our LinkedIn feature article