LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • Microsoft Page View Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Integrating Microsoft Defender with Keepnet Phishing Reporter
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Shortcuts
  • FAQ
  • Q: Is there a way to have Vishing Simulations call immediately instead of during a randomised time throughout the provided period?
  • Q: How Is the Difficulty Level Determined?
  • Q: Is it possible to make identity spoofing and decide which name will appear on the screen?

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform

Vishing Simulator

PreviousCallback Phone NumbersNextVishing Templates

Last updated 1 year ago

Was this helpful?

The Vishing Simulator allows you to create a realistic simulated vishing call that is sent to employees in order to assess their ability to recognize suspicious calls and their response to attacks that could compromise organizational data and systems. The product provides the capability to customize and target a vishing campaign suited to your organization and to evaluate the results.

Shortcuts

FAQ

Q: Is there a way to have Vishing Simulations call immediately instead of during a randomised time throughout the provided period?

A: The best way to do this would be to finite the campaign launch down to a 30-minute bracket. Currently, there is not a send test now option but you can preview the step and hear the voice AI you selected on the summary page

Q: How Is the Difficulty Level Determined?

A: The difficulty level for each vishing template is determined by several key factors that reflect the complexity and subtlety of the simulated attack. These include:

  • Complexity of the Scenario: More intricate scenarios that involve detailed background stories or require understanding of specific knowledge areas are considered more difficult.

  • Caller Identification and Spoofing Techniques: Templates that use advanced caller ID spoofing to appear more legitimate increase the difficulty level, as they are harder for individuals to immediately recognize as fraudulent.

  • Quality and Clarity of the Recording: The presence of background noise, the caller's tone, speed, and clarity of speech can affect how easily the call can be identified as a phishing attempt. Higher quality, clear, and persuasive recordings are classified as more difficult.

  • Use of Persuasion Techniques: The employment of psychological tactics, such as urgency, authority, or social proof, makes a template more challenging. Calls that effectively mimic legitimate authority figures or situations require a higher level of skepticism and awareness to identify.

  • Requested Action Complexity: The complexity of the action the caller requests from the target, such as transferring funds, providing sensitive information, or performing specific tasks, contributes to the template's difficulty rating. More complex and less obviously suspicious requests are rated as more difficult.

Criteria for Difficulty Levels

  • Easy: These calls might include obvious signs of phishing, such as poor quality recordings, unrealistic requests, or lack of specificity in the caller’s request. They are designed for users with basic awareness.

  • Medium: These examples are more advanced, with clearer sound and more realistic stories. However, there might still be small giveaways that show they are fake, especially if you know what to listen for.

  • Hard: These are highly sophisticated attempts that very closely mimic legitimate calls, employing advanced spoofing techniques, persuasive speech, and realistic requests. Recognizing these requires advanced awareness of identity voice phishing tactics.

Q: Is it possible to make identity spoofing and decide which name will appear on the screen?

In order to comply with laws and regulations, we utilize A2P-10DLC compliant phone numbers for our Vishing simulations. At present, we do not support spoofing since it could potentially violate these regulations. Our commitment to legal compliance ensures that our simulations are both ethical and effective, without compromising on security or integrity.

💫
Template List
Campaign Manager
Reports