EXPLORE
← Back to Explore
T1566.004

Spearphishing Voice

Adversaries may use voice communications to ultimately gain access to victim systems. Spearphishing voice is a specific variant of spearphishing. It is different from other forms of spearphishing in that it employs the use of manipulating a user into providing access to systems through a phone call or other forms of voice communications. Spearphishing frequently involves social engineering techniques, such as posing as a trusted source (ex: [Impersonation](https://attack.mitre.org/techniques/T16...

LinuxmacOSWindowsIdentity Provider
0
Detections
0
Sources
1
Threat Actors

THREAT ACTORS (1)

DETECTIONS (0)