Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • DSA
  • Practice Problems
  • C
  • C++
  • Java
  • Python
  • JavaScript
  • Data Science
  • Machine Learning
  • Courses
  • Linux
  • DevOps
  • SQL
  • Web Development
  • System Design
  • Aptitude
  • GfG Premium
Open In App
Next Article:
Difference Between Vishing and Smishing Attacks
Next article icon

Difference Between Vishing and Smishing Attacks

Last Updated : 07 May, 2023
Comments
Improve
Suggest changes
Like Article
Like
Report

Pre-requisites: Difference between Phishing and Vishing

There are several types of Email attacks that are used by the attackers to steal confidential information from users. The confidential information may include login credentials, bank card details, or any other sensitive data. 

In this article we will see difference between Vishing  and Smishing  Attacks. 

Vishing

In contrast to smishing, which uses SMS (short message service) messages to deceive victims, vishing involves placing VoIP (Voice over IP) phone calls. The attacker may pose as an authorized employee of a company or other institution to acquire the victim's trust.

Examples of a vishing call:

  • Fraud customer care asking your OTP and CVV.
  • Fraud delivery services asking for your address and personal information practicing an active reconnaissance.

Smishing

This is a type of phishing scam in which hackers send SMS messages (or text messages) to victims to convince them into disclosing personal information or download malware. Smishing messages frequently seem to be coming from a reliable source, like a reputable business or governmental organization. To persuade victims to take immediate action, it could even use urgent rhetoric or threats. Occasionally, the message will also contain a link that will take the recipients to a phony website where they will be asked to enter personal information or download malicious software.

Examples of a smishing text message:

  • We have seen some strange behavior on your account. To speak with a customer support agent, please dial this number.
  • You've earned a complimentary gift card! Claim your prize by clicking here.
  • Hi! We saw that you were only a recent client of ours. Please enter your personal information by clicking this link: http://gooogle.com/customercare.com to complete the account setup process.


Difference between Vishing  and Smishing  Attacks

ParametersVishingSmishing
Attack methodUses a phone call or VoIP to trick the victim.Uses text messages or SMS to trick the victim
Type of attackPhone-based social engineering attackSMS-based social engineering attack
 ScenarioTo win the victim's trust, the attacker can impersonate a trustworthy employee of a business or other institution.When trying to get the victim to act swiftly and click the link or download the attachment, the attacker may appeal to their sense of urgency or panic.
Impact on victimthe victim can experience identity theft or financial loss.The victim may have a lost of money or experience identity theft, or malware may corrupt their device.
PreventionWhen receiving an unexpected call, be wary and ask the caller to leave a verified number before answering. Don't divulge private information over the phone until you are certain who is calling.Be wary of unsolicited text messages, and only click on links or download files if you are certain who sent them. To avoid malware attacks, install anti-virus software on your computer.

Next Article
Difference Between Vishing and Smishing Attacks

N

nkhack123
Improve
Article Tags :
  • Difference Between
  • Ethical Hacking
  • Ethical Hacking - Misc

Similar Reads

    Difference Between Phishing and Vishing
    Cyber Criminals have turned to the use of emails to conduct various attacks on users to steal cybercriminals' critical information from the latter. This may include logins and passwords any other bank card numbers or any other personal details. Out of all the email attacks that are being used Phishi
    4 min read
    Difference between Spoofing and Phishing
    Cyber threats such as spoofing and phishing are easily confused especially because they are often depicted as the same thing even though they differ in nature and intent. Both are employed by hackers to lure people or organizations into releasing their personal data including login credentials, pers
    7 min read
    Difference between Phishing and Pharming
    Phishing and Pharming are the terms that are used in cyber security but both are dangerous for the users and the computer system but they are different. In Phishing, hackers spam the targeted users by sending instant emails they attach any malicious attachments to emails when users open those attach
    4 min read
    Difference between Phishing and Spear Phishing
    Phishing and Spear Phishing happen to be two of the most common cyber threats, that are now quite common in this digital age. While both of these strategies have an element of fooling people into extracting some sensitive information, they differ in approach and targeting.There are several email att
    5 min read
    Difference Between Spear Phishing and Whaling
    Cybersecurity threats are ever-evolving, with phishing attacks being one of the maximum commonplace techniques utilized by attackers to borrow private information. Among those, Spear Phishing and Whaling stand out as specially targeted forms of e-mail phishing. Both strategies intend to deceive reci
    4 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences