{"id":366163,"date":"2026-03-31T12:48:13","date_gmt":"2026-03-31T16:48:13","guid":{"rendered":"https:\/\/tech.co\/?p=366163"},"modified":"2026-03-31T12:48:13","modified_gmt":"2026-03-31T16:48:13","slug":"report-voice-based-phishing-surges","status":"publish","type":"post","link":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges","title":{"rendered":"Report: Voice-Based Phishing Sees a &#8220;Significant Surge&#8221;"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]\n<\/p><div class=\"verdict-box inform-box\" data-eventcategory=\"verdictbox\" data-component=\"verdict-box\" data-total-positions=\"3\">\n\n <div class=\"verdict-box-wrap inform-box-wrap\">\n <h3 class=\"verdict-box-title\">Key Takeaways<\/h3>\n \n <div class=\"verdict-box-info\">\n<ul>\n<li><strong>Highly interactive voice phishing is the second-most common cyberthreat vector<\/strong>, making up 11% of incidents.<\/li>\n<li><strong>Email phishing only makes up 6% of incidents<\/strong>, says a new Google report.<\/li>\n<li><strong>Voice social engineers can target IT help desks<\/strong> to bypass multifactor authentication.<\/li>\n<\/ul>\n<p>\n<\/p><\/div>\n <\/div>\n\n <div class=\"verdict-box-footer inform-box-buttons\">\n <div class=\"container\">\n <div class=\"row\">\n <\/div>\n <\/div>\n <\/div>\n\n<\/div>\n[vc_column_text css=&rdquo;&rdquo;]\n<p><a href=\"https:\/\/tech.co\/news\/from-temu-emails-to-voice-cloning-the-worst-scams-of-2024\"><strong>Voice phishing<\/strong><\/a> is getting better and better: It&rsquo;s now the second most popular initial entry point for cyber attacks, according to Google.<\/p>\n<p>The Google Threat Intelligence Group&rsquo;s latest report is out from incident response unit Mandiant, and it found that &ldquo;highly interactive&rdquo; voice fakery now makes up 11% of vectors observed across 2025.<\/p>\n<p>That&rsquo;s almost twice as frequent as <a href=\"https:\/\/tech.co\/news\/ai-taking-over-phishing-emails\"><strong>email phishing<\/strong><\/a> attacks (6%), which were once a huge staple of hackers everywhere.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&rdquo;2\/3&Prime;][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>Voice Phishing Surged Across 2025, New Data Shows<\/h2>\n<p>&ldquo;Highly interactive voice phishing saw a significant surge to 11%, becoming the second-most commonly observed vector&rdquo; in 2025, <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/m-trends-2026\" target=\"_blank\" rel=\"noopener noreferrer\">the report<\/a> said.<\/p>\n<p>However, it notes that &ldquo;exploits remained the most common initial infection vector for the sixth consecutive year, accounting for 32% of intrusions.&rdquo;[\/vc_column_text][\/vc_column][vc_column width=&rdquo;1\/3&rdquo;]<\/p><p>&nbsp;<\/p>\n<p style=\"text-align: center\"><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-333457\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/06\/18114043\/About-Techco-video.jpg\" alt=\"About Tech.co Video Thumbnail Showing Lead Writer Conor Cawley Smiling Next to Tech.co Logo\" width=\"200\" height=\"200\"><\/a><strong>This just in! View<\/strong><br>\n<strong><a href=\"https:\/\/compare.tech.co\/software-deals-live\/\">the top business tech deals<\/a> for 2026 &#128104;&zwj;&#128187;<br>\n<\/strong><a class=\"js-aw-brand-link\" href=\"https:\/\/compare.tech.co\/software-deals-live\/\" data-feed=\"XuPuf49GEEm4y0PaIQDZ0dEjkEf760Vv\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-348272 aligncenter\" src=\"https:\/\/images.tech.co\/wp-content\/uploads\/2024\/09\/09122654\/ok-1.png\" alt=\"See the list button\" width=\"200\" height=\"85\"><\/a><\/p>\n[\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]\n<p>What does voice phishing look like in practice? <strong>Some groups target IT help desks<\/strong> with the aim of fully bypassing typical security measures like multifactor authentication (MFA) in order to get the initial access to software-as-a-service (SaaS) environments that they need.<\/p>\n<div class=\"lytics-newsletter-container\">\n <div class=\"lytics-loading-spinner\">\n <div class=\"spinner\"><\/div>\n <\/div>\n <div class=\"lytics-newsletter-PnIdremy\"><\/div>\n <\/div>\n\n <script>\n            (function() {\n                        \n            const getFormElements = () => ([\n                {\n                    type: 'text',\n                    name: 'name',\n                    label: 'Name',\n                    placeholder: 'Name',\n                    required: true,\n                },\n                {\n                    type: 'email',\n                    name: 'email',\n                    label: 'Email Address',\n                    placeholder: 'Email Address',\n                    required: true,\n                },\n            ]);\n\n            const getFormStates = (successLink) => {\n                let successMessage = 'We have received your submission, thank you for signing up.';\n\n                if (successLink) {\n                    successMessage = successMessage + '\\<a class\\=\\\"pf-download-link\\\" target\\=\\\"_blank\\\" href\\=\\\"' + successLink + '\\\"\\>Download Here\\<\\\/a\\>';\n                }\n\n                return {\n                    success: {\n                        msg: successMessage,\n                        delay: 0\n                    },\n                    error: {\n                        msg: 'Please enter a valid email address.',\n                        delay: 0\n                    }\n                };\n            };\n\n            const getConfirmAction = (successLink) => ({\n                name: 'subscription',\n                waitForAsyncResponse: true,\n                callback: function (event, payload, cb) {\n                    var emailAddress = payload['data'][1]['value'];\n                    \/\/ RFC 5322 compliant email regex pattern\n                    const emailRegex = \/^[a-zA-Z0-9.!#$%&'*+\/=?^_`{|}~-]+@[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?(?:\\.[a-zA-Z0-9](?:[a-zA-Z0-9-]{0,61}[a-zA-Z0-9])?)*$\/;\n                    var valid = emailRegex.test(emailAddress);\n                    cb(valid);\n                    if (valid && successLink) {\n                        window.open(successLink);\n                    }\n                }\n            });\n\n            var defaultConfig = {\n                generic: {\n                    theme: 'custom',\n                    colors: {\n                        background: 'var(--flexi-lytics-bg-color)',\n                        text: 'var(--flexi-lytics-fg-color)',\n                        close: '#a6a8c7',\n                        actionBackground: 'var(--flexi-lytics-btn-bg-color)',\n                        actionText: 'var(--flexi-lytics-btn-text-color)',\n                        fieldBackground: '#fff'\n                    }\n                },\n            };\n        \n        \n                function initializeNewsletterWidget() {\n                    if (typeof jstag === 'undefined') {\n                        setTimeout(initializeNewsletterWidget, 100);\n                        return;\n                    }\n\n                    window.lyticsIters = window.lyticsIters || {};\n\n                    let lyticsFormID;\n\n                    jstag.on(\"pathfora.publish.done\", function renderNewsletterWidget() {\n                        if (window.lyticsInitialising) {\n                            setTimeout(renderNewsletterWidget, 100);\n                            return;\n                        }\n\n                        window.lyticsInitialising = true;\n\n                        const newsletterContainer = document.querySelector('.lytics-newsletter-PnIdremy');\n                        \n                                \n            const newsletterOnLoad = (event, payload, newsletterName, newsletterLogo, title, ctaType, download) => {\n                const newsletterLogoEl = newsletterContainer.querySelector('.newsletter-logo');\n                const widgetText = newsletterContainer.querySelector('.pf-widget-text');\n                \n                if (!newsletterContainer) return;\n\n                if (newsletterLogo !== '' && !newsletterLogoEl) {\n                    newsletterLogo = '<img loading=\"lazy\"  src=\\\"' + newsletterLogo + '\\\" class=\"newsletter-logo\" alt=\"' + newsletterName + '\" \\\/>';\n                    newsletterContainer.insertAdjacentHTML('afterbegin', newsletterLogo);\n                }\n\n                if (title !== '') {\n                    widgetText.querySelector('h2').remove();\n                    title = \"<h3 class=\\\"pf-widget-headline\\\">\" + title + \"<\\\/h3>\";\n                    widgetText.insertAdjacentHTML('afterbegin', title);\n                }\n\n                const footerText = 'Brought to you by';\n                const footerOpen = \"<p class=\\\"brought-to-you\\\">\";\n                const footerClose = \"<\\\/p>\"\n                let legalText = \"<div class=\\\"legal-text\\\"><p>By signing up to receive our newsletter, you agree to our\\n                <a href=\\\"https:\\\/\\\/www2.mvfglobal.com\\\/privacypolicy\\\/b649e\\\" title=\\\"Privacy Policy\\\" target=\\\"_blank\\\">\\n                    Privacy Policy\\n                <\\\/a>.\\n                You can <strong>unsubscribe<\\\/strong> at any time.\\n            <\\\/p><\\\/div>\";\n                let footerLogo = 'https:\/\/images.tech.co\/wp-content\/uploads\/2025\/08\/11050011\/techoco-logo.svg';\n\n                if (footerLogo !== '') {\n                    footerLogo = '<img loading=\"lazy\"  src=\\\"' + footerLogo + '\\\" alt=\\\"Tech.co\\\" \\\/>';\n                }\n\n                if (download) {\n                    legalText = \"<div class=\\\"legal-text\\\"><p>By downloading, you'll also sign up to our newsletter and agree to our\\n                <a href=\\\"https:\\\/\\\/www2.mvfglobal.com\\\/privacypolicy\\\/b649e\\\" title=\\\"Privacy Policy\\\" target=\\\"_blank\\\">\\n                    Privacy Policy\\n                <\\\/a>.\\n                You can <strong>unsubscribe<\\\/strong> at any time.\\n            <\\\/p><\\\/div>\";\n                }\n\n                const smallPrint = legalText + footerOpen + footerText + footerLogo + footerClose;\n\n                const newsletterForm = newsletterContainer.querySelector('form');\n\n                newsletterForm.insertAdjacentHTML('beforeend', smallPrint);\n\n                isSuspicious().then(result => {\n                    if (result) {\n                        let susText = '<p><strong>Form cannot be loaded. If using a VPN, ';\n                        susText = susText + 'please disable and refresh page.<\\\/strong><\\\/p>';\n                        newsletterForm.querySelectorAll('div.pf-form-required').forEach(el => el.remove());\n                        newsletterForm.querySelector('button').remove();\n                        newsletterForm.insertAdjacentHTML('afterbegin', susText);\n                    } else {\n                        const observer = new IntersectionObserver((entries, observerInstance) => {\n                            entries.forEach(entry => {\n                                if (entry.isIntersecting) {\n                                    document.dispatchEvent(\n                                        new CustomEvent(\n                                            'lyticsNewsletterWidgetLoad', {\n                                                detail: {\n                                                    event,\n                                                    payload,\n                                                    name: newsletterName,\n                                                    cta: ctaType,\n                                                }\n                                            }\n                                        )\n                                    );\n                                    observerInstance.disconnect();\n                                }\n                            });\n                        });\n                        observer.observe(newsletterContainer);\n                    }\n                });\n\n                window.lyticsInitialising = false;\n            };\n        \n        \n                        \n                        lyticsFormID = 'form-module-tech_co';\n\n                        if (document.getElementById(lyticsFormID)) {\n                            if (!window.lyticsIters[lyticsFormID]) {\n                                window.lyticsIters[lyticsFormID] = 1;\n                            } else {\n                                window.lyticsIters[lyticsFormID] = window.lyticsIters[lyticsFormID] + 1;\n                            }\n                        }\n\n                        if (window.lyticsIters[lyticsFormID] >= 1) {\n                            lyticsFormID = lyticsFormID + '-' + window.lyticsIters[lyticsFormID];\n                        }\n\n                        var defaultFormModule = new pathfora.Form({\n                            id: lyticsFormID,\n                            layout: 'inline',\n                            className: 'sign-up-newsletter',\n                            position: '.lytics-newsletter-PnIdremy',\n                            msg: \"Stay informed on the top business tech stories with Tech.co's weekly highlights reel.<ul><li>Essential tech industry news<\\\/li><li>Special features and interviews from industry experts<\\\/li><li>Offers and discounts<\\\/li><\\\/ul>\",\n                            okMessage: 'Subscribe',\n                            theme: 'custom',\n                            branding: false,\n                            confirmAction: getConfirmAction(false),\n                            formStates: getFormStates(false),\n                            formElements: getFormElements(),\n                            onLoad: function(event, payload) {\n                                newsletterOnLoad(\n                                    event,\n                                    payload,\n                                    'Tech.co',\n                                    '',\n                                    'Get the latest tech news, straight to your inbox',\n                                    \"Lytics_inline\",\n                                    false                                );\n                            }\n                        });\n\n                        const userAudiences = jstag.getSegments();\n\n                        \/\/ Find the first matching segment from modules.target that exists in userAudiences\n                        const findMatchingSegment = (modules) => {\n                            \/\/ Loop through modules.target in priority order\n                            for (const module of modules.target) {\n                                \/\/ Check if this module's segment exists in userAudiences\n                                if (userAudiences.includes(module.segment)) {\n                                    return module;\n                                }\n                            }\n                            \/\/ If no match found, return the default module\n                            return modules.target.find(module => module.segment === 'all');\n                        };\n\n                        var modules = {\n                            target: [\n                                                                {\n                                    segment: 'all',\n                                    widgets: [defaultFormModule],\n                                    key: 'default'\n                                }\n                            ]\n                        };\n\n                        \/\/ Find the matching module and create a new modules object with only that module\n                        const matchingModule = findMatchingSegment(modules);\n                        const filteredModules = {\n                            target: matchingModule ? [matchingModule] : []\n                        };\n\n                        pathfora.initializeWidgets(filteredModules, defaultConfig);\n\n                        \/\/ Remove loading spinner after widget initialization\n                        const loadingSpinner = newsletterContainer.previousElementSibling;\n\n                        if (loadingSpinner) {\n                            loadingSpinner.classList.add('hidden');\n                        }\n                    });\n                }\n\n                initializeNewsletterWidget();\n            })();\n        <\/script>\n [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]\n<h2>Email Phishing Attempts Were Less Frequent<\/h2>\n<p>In a sharp contrast, email phishing fell to just 6% of intrusions last year. Social engineers appear to be moving to audio and away from text.<\/p>\n<p>Other takeaways from the new report:<\/p>\n<ul>\n<li>Cybercriminals a lot faster at handing off initial access in targeted environments: Their window was <strong>just 22 seconds in 2025 &ndash; huge drop from eight hours in 2022<\/strong>.<\/li>\n<li><strong>Global median dwell time is 14 days, up from 11 days<\/strong>. This &ldquo;likely reflects growing sophistication, particularly in evading defenses.&rdquo;<\/li>\n<li><strong>Organizations are getting better at spotting threats<\/strong> internally: &ldquo;52% of the time organizations first detected evidence of malicious activity internally, an increase from 43% in 2024.&rdquo;<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css=&rdquo;&rdquo;]<\/p>\n<h2>Cyber Criminals Love AI Tools<\/h2>\n<p>AI-powered voice phishing is just the start: Once they&rsquo;ve gained access, hackers can harvest OAuth tokens and session cookies or steal hard-coded keys and personal access tokens. They can then use all that data to infiltrate downstream environments and steal mass amounts of customer data.<\/p>\n<p>The new report joins similarly troubling analyses from recent months.<\/p>\n<p>Most recently, we covered <a href=\"https:\/\/tech.co\/news\/ai-threats-cybersecurity-tipping-point\"><strong>a study by Armis<\/strong><\/a> that claimed cyber crime had hit a global &ldquo;tipping point.&rdquo; We&rsquo;ve also heard from yet another study which determined that a full <a href=\"https:\/\/tech.co\/news\/professionals-security-tools-cant-keep-up\"><strong>68% of professionals<\/strong><\/a> say existing security tools can&rsquo;t mitigate new threats.<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).<\/p>\n","protected":false},"author":8412,"featured_media":357493,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-sidebar.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-366163","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","col-12"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report: Voice-Based Phishing Surges to New Heights<\/title>\n<meta name=\"description\" content=\"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report: Voice-Based Phishing Surges to New Heights\" \/>\n<meta property=\"og:description\" content=\"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\" \/>\n<meta property=\"og:site_name\" content=\"Tech.co\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-31T16:48:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Rowe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdamRRowe\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Rowe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#article\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\"},\"author\":{\"name\":\"Adam Rowe\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"headline\":\"Report: Voice-Based Phishing Sees a &#8220;Significant Surge&#8221;\",\"datePublished\":\"2026-03-31T16:48:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\"},\"wordCount\":514,\"image\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg\",\"keywords\":[\"AI Tools\",\"Cybersecurity Guides\",\"Privacy and Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/tech.co\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\",\"url\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\",\"name\":\"Report: Voice-Based Phishing Surges to New Heights\",\"isPartOf\":{\"@id\":\"https:\/\/tech.co\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage\"},\"thumbnailUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg\",\"datePublished\":\"2026-03-31T16:48:13+00:00\",\"author\":{\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\"},\"description\":\"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).\",\"breadcrumb\":{\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage\",\"url\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg\",\"contentUrl\":\"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg\",\"width\":1920,\"height\":960,\"caption\":\"A salesman talks to a customer on the phone.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tech.co\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report: Voice-Based Phishing Sees a &#8220;Significant Surge&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tech.co\/#website\",\"url\":\"https:\/\/tech.co\/\",\"name\":\"Tech.co\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tech.co\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292\",\"name\":\"Adam Rowe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg\",\"caption\":\"Adam Rowe\"},\"description\":\"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.\",\"sameAs\":[\"https:\/\/x.com\/AdamRRowe\"],\"url\":\"https:\/\/tech.co\/author\/arrowe\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report: Voice-Based Phishing Surges to New Heights","description":"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges","og_locale":"en_US","og_type":"article","og_title":"Report: Voice-Based Phishing Surges to New Heights","og_description":"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).","og_url":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges","og_site_name":"Tech.co","article_published_time":"2026-03-31T16:48:13+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg","type":"image\/jpeg"}],"author":"Adam Rowe","twitter_card":"summary_large_image","twitter_creator":"@AdamRRowe","twitter_misc":{"Written by":"Adam Rowe","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#article","isPartOf":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges"},"author":{"name":"Adam Rowe","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"headline":"Report: Voice-Based Phishing Sees a &#8220;Significant Surge&#8221;","datePublished":"2026-03-31T16:48:13+00:00","mainEntityOfPage":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges"},"wordCount":514,"image":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg","keywords":["AI Tools","Cybersecurity Guides","Privacy and Security"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/tech.co\/#organization"}},{"@type":"WebPage","@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges","url":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges","name":"Report: Voice-Based Phishing Surges to New Heights","isPartOf":{"@id":"https:\/\/tech.co\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage"},"image":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage"},"thumbnailUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg","datePublished":"2026-03-31T16:48:13+00:00","author":{"@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292"},"description":"In 2025, phishing incidents are nearly twice as likely to start with voice impersonation (11%), not emails (6%).","breadcrumb":{"@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tech.co\/news\/report-voice-based-phishing-surges"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#primaryimage","url":"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg","contentUrl":"https:\/\/images.tech.co\/wp-content\/uploads\/2023\/03\/28091328\/AdobeStock_839127032-1.jpeg","width":1920,"height":960,"caption":"A salesman talks to a customer on the phone."},{"@type":"BreadcrumbList","@id":"https:\/\/tech.co\/news\/report-voice-based-phishing-surges#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tech.co\/"},{"@type":"ListItem","position":2,"name":"Report: Voice-Based Phishing Sees a &#8220;Significant Surge&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/tech.co\/#website","url":"https:\/\/tech.co\/","name":"Tech.co","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tech.co\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tech.co\/#\/schema\/person\/3739751aacc508123eba8eebb1321292","name":"Adam Rowe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6bad71f4a9ff3199d81e4d1a25ac7df69ccb889fba23589c6178ed3f080039af?s=96&d=blank&r=pg","caption":"Adam Rowe"},"description":"Adam has been a writer at Tech.co for nine years, covering fleet management and logistics. He has also worked at the logistics newletter Inside Lane, and has worked as a tech writer, blogger and copy editor for more than a decade. He was a Forbes Contributor on the publishing industry, for which he was named a Digital Book World 2018 award finalist. His work has appeared in publications including Popular Mechanics and IDG Connect, and his art history book on 1970s sci-fi, 'Worlds Beyond Time,' was a 2024 Locus Awards finalist. When not working on his next art collection, he's tracking the latest news on VPNs, POS systems, and the future of tech.","sameAs":["https:\/\/x.com\/AdamRRowe"],"url":"https:\/\/tech.co\/author\/arrowe"}]}},"_links":{"self":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/366163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/users\/8412"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/comments?post=366163"}],"version-history":[{"count":0,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/posts\/366163\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media\/357493"}],"wp:attachment":[{"href":"https:\/\/tech.co\/wp-json\/wp\/v2\/media?parent=366163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}