Vishing works like phishing but does not always occur over the internet and is carried out using voice technology. A vishing attack can be conducted by voice email, VOIP (Voice over IP), or landline or cellular telephone.
What does fraudster wants?
By impersonating as a trustworthy entity over call (Telephone / Mobile / IVR – Interactive Voice Response), the fraudster attempts to acquire sensitive information such as:
Beware when you get a call from an unknown caller saying…?
Magma Fincorp Limited does not request for personal account information or any other related information by text message, email, or automated phone call
Do not respond to any unsolicited texts, emails, pop-ups, or links that ask for personal information of any kind.