In February 2026, the New York Department of Financial Services issued a formal advisory to the CISOs of every regulated entity in the state, warning of an active campaign in which attackers spoof caller IDs, impersonate IT help-desk staff, and direct employees to malicious links over the phone. Two months earlier, CrowdStrike’s 2025 Global Threat Report documented a “442% increase in vishing attacks between the first and second halves of 2024.” A state regulator and the largest endpoint telemetry vendor in the market are describing the same threat at the same time.

For a security leader who has already paid for email security, MFA, and a year of awareness training, that combination is uncomfortable. The phone is the one channel almost no one is monitoring. CTDefense is publishing this brief because the buyer-side question has moved from “should we worry about voice-channel attacks” to “what does our security operations centre actually need to do about them.”

What vishing looks like as an enterprise attack

Modern vishing is not a single phone call. It is a multi-stage operation that uses the call as an authentication bypass and then pivots into a familiar identity-abuse playbook. The pattern that CTDefense sees in practice mirrors what Sophos describes in its Active Adversary Report 2026: a help-desk impersonation, a credential or MFA prompt handed over by the employee, and a logon from an unfamiliar location within minutes.

A representative sequence:

This is not a user-awareness story. It is a detection story. Awareness training reduces the rate at which employees fall for the call, but it does not detect the ones who do, and it does not detect the post-call activity. That is the gap CTDefense’s clients are asking the team to close.

What the SOC can actually see after the call

The phone call itself is invisible to the security stack. What is not invisible is the wake the attacker leaves behind once they try to use what they took. A SOC with the right telemetry sees a recognisable pattern within minutes of a successful vishing compromise.

The team focuses on six signals:

None of these signals require new tooling on top of a properly instrumented Microsoft 365, Okta, or Google Workspace tenant, plus the identity provider’s sign-in logs and a connected EDR. What they require is correlation, tuning, and 24/7 eyes. That is what an MDR service is for.

The first thirty minutes of response

When a vishing compromise is suspected, the response window is short. CrowdStrike’s data on eCrime breakout times — the time between initial access and lateral movement — has dropped to under an hour for the fastest groups. A delayed response is, in practice, no response.

CTDefense works to a thirty-minute containment target for confirmed identity compromise. The actions that matter most in that window:

Verizon’s DBIR puts ransomware in 44% of breaches. The vast majority of those ransomware events begin with credential or session-token compromise. The thirty minutes after a vishing call is where ransomware is either prevented or guaranteed.

What to ask your current MDR provider

Most MDR contracts were written when “managed detection and response” meant endpoint. The threat surface has moved. Before the next renewal, CTDefense suggests asking five direct questions:

The answers separate providers that have adapted to the identity-first threat landscape from providers still selling endpoint telemetry under a new label.

Where this leaves you

Awareness training is necessary. It is not sufficient. The DFS advisory and the CrowdStrike data both point at the same conclusion: vishing is now part of the standard intrusion kit, the call itself sits outside the security stack, and the only durable answer is a SOC that can recognise the post-call pattern and act on it inside thirty minutes.

CTDefense supports financial services, healthcare, and technology organisations across Europe and North America with managed detection and response built around identity and cloud telemetry as first-class data, not endpoint with extras bolted on. Organisations that have already invested in MFA and email security and still feel exposed to voice-channel attacks are encouraged to review their MDR scope against the questions above. The threat moved. The coverage should move with it.

Leave a Reply