Every technique described here is documented from real-world incidents and threat intelligence research. We explain how these attacks work so your team recognises them — not to enable them. The best defence against social engineering is always an informed human.
The Rules of Phishing Just Got Rewritten
For twenty years, we taught people to spot phishing by looking for the same things: bad grammar, generic greetings, suspicious sender addresses, unusual links. That training still matters. But the attack landscape has moved so far, so fast, that the old indicators are now table stakes — and the new techniques operate on an entirely different level.
The shift is AI. Not AI as a vague concept, but specific, accessible, cheap tools that let an attacker sound exactly like your CEO, appear on a video call as your IT manager, bypass every email security filter you have, and have a live, convincing conversation in real time. The technology that makes this possible costs less than a monthly gym membership and requires no technical expertise to use.
This article covers seven techniques that are either already active in the wild or have been demonstrated in controlled environments with realistic deployment potential. Some will make you uncomfortable. That's the point.
Technique 01 — AI Voice Cloning Vishing
Modern voice cloning tools — several of which are free or low-cost — can produce a convincing clone of any person's voice from as little as three seconds of audio. LinkedIn videos, YouTube interviews, podcast appearances, company website videos, recorded Teams calls leaked by an insider — all of these are viable source material. The attacker feeds the clip into the tool, and within minutes has a voice model they can type text into and have spoken aloud in the target's voice, in real time, on a phone call.
The attack vector most commonly deployed is the urgent wire transfer scenario. The attacker, posing as the CEO or a senior director, calls the financial controller or accounts payable staff member. The voice is the CEO's. The tone is familiar. The request is for an urgent payment to a new beneficiary — a supplier, a legal settlement, an acquisition deposit — and it needs to happen before close of business today. Don't email. Just do it. I'll explain later.
This attack has cost South African businesses tens of millions of rands. It works because it bypasses every technical control you have — it's a phone call, and the voice sounds exactly like someone your staff trusts implicitly.
Here's a reconstructed example of how such a call sounds — based on a documented incident pattern:
Establish a verbal safe word with your leadership team — a short, random word that must be included in any urgent financial instruction. If the caller doesn't know it, the call is fraudulent. Separately, implement a strict policy: no payment to a new beneficiary without a callback to a pre-verified number — not a number the caller gives you, but the number in your phone book. One extra call is all it takes.
Technique 02 — Deepfake Video Calls
In early 2024, a finance employee at a multinational firm in Hong Kong was convinced to transfer the equivalent of R390 million after a video call in which every participant — including the CFO — was a deepfake. The technology has only become cheaper and more accessible since then. Tools like Deep-Live-Cam can run real-time face and voice replacement on consumer-grade hardware, requiring only a reference photo of the target and a short video clip for the voice.
The attack typically unfolds as follows: the target receives a meeting invitation for an urgent call. On the call, they see a familiar face — their manager, an IT helpdesk technician, an external auditor. The deepfake is plausible enough to pass a quick visual check, particularly on a lower-resolution video call. The attacker then uses the call to request credential resets, MFA bypass approvals, wire transfers, or access to sensitive systems.
A particularly effective variant targets IT helpdesk staff: the attacker poses as a senior executive in an emergency, requesting an immediate password reset without following standard verification procedure. Under the visual authority of a familiar face and an urgent tone, helpdesk staff frequently comply.
Deepfakes still struggle with: edge blur around hair and ears, especially when the person moves quickly; unnatural blinking patterns (too frequent or too infrequent); misaligned lighting — the face is lit differently to the background; and slight audio/visual sync issues when the person moves their head. Ask the caller to turn sideways briefly — profile views are consistently harder for real-time deepfakes to render convincingly. Better yet: require all sensitive video-based authorisations to be followed up with an out-of-band confirmation via a separate channel.
Technique 03 — Quishing (QR Code Phishing)
Your email security gateway scans every link in every email you receive. It detonates attachments in sandboxes. It checks URLs against threat intelligence feeds. It does all of this automatically. It cannot read a QR code.
Quishing — phishing via QR code — exploits this gap completely. The attacker sends an email with no suspicious links, no malicious attachments, and no URL for any filter to evaluate. Just a QR code embedded as an image. The email passes through every layer of your email security. The target scans the code with their phone — which is almost certainly outside your corporate security perimeter, unmanaged, and without any email security context — and is taken directly to a credential-harvesting page or malware download.
Common pretexts include: Microsoft MFA re-enrolment ("scan to verify your account"), parking fine payment notices, parcel delivery confirmation, and HR document signing. Physical quishing — where QR code stickers are placed over legitimate codes on parking meters, restaurant menus, or office printer instructions — brings this attack entirely offline and into physical spaces.
Subject: ACTION REQUIRED: Microsoft Authenticator re-enrolment
Your MFA device registration expires in 24 hours.
Scan the QR code below to re-enrol and maintain access.
[ QR CODE IMAGE — links to: microsoft-auth-portal-za.com/renew ]
If you do not complete this within 24 hours,
your account will be suspended.
IT Support · Greyhat Industries
Train staff to never scan a QR code in an email without first hovering to preview the URL (desktop) or using a QR scanner app that shows the destination URL before opening it. Your IT team should configure email gateways to flag or quarantine emails containing embedded QR code images. And establish a rule: your company will never send an MFA or account action via a QR code — so any email that does is automatically suspicious.
Technique 04 — AI-Personalised Smishing
Old smishing was obvious: "SARS refund available, click here." Current smishing is something else entirely. Attackers now combine open-source intelligence (OSINT) with large language models to generate SMS messages that are personalised to the individual target using publicly available information — their name, employer, recent LinkedIn activity, area of residence, and even recent news events relevant to their industry.
The result is a text message that feels like it came from someone with inside knowledge. A dental practice owner might receive: "Hi Dr Sykes, following up on the POPIA compliance consultation we discussed — your submitted documents need a digital signature before Friday. Reply CONFIRM to receive the secure link." The attacker has harvested your name, profession, and a topical compliance concern from public sources, then crafted a message that sounds like a vendor follow-up.
At scale, this is now automated. Tools exist that take a list of phone numbers, scrape OSINT data for each one, and generate personalised phishing SMS messages in bulk using an LLM. What used to require a skilled social engineer hours of manual research now takes minutes per thousand targets.
Technique 05 — Adversary-in-the-Middle (AiTM) Phishing
You've rolled out MFA. You've trained your team not to click suspicious links. Then an adversary-in-the-middle attack walks straight past both of those defences and steals an authenticated session anyway — without ever needing your password or your MFA code.
Here's how it works. The attacker sets up a reverse proxy — a server that sits between the victim and the legitimate site (say, your Microsoft 365 login). The victim receives a phishing link and visits what appears to be the genuine Microsoft login page — because it effectively is, just proxied through the attacker's server. The victim enters their credentials. The victim completes MFA. The session token is issued by Microsoft. The attacker's proxy silently copies that session token. The victim logs in successfully and notices nothing. The attacker replays the stolen session token from their own machine and is now authenticated as the victim — with full access — without ever triggering an MFA prompt.
Toolkits like Evilginx make this deployable by anyone with basic server skills. It is one of the reasons MFA alone is no longer a complete answer to account takeover — and why phishing-resistant MFA (hardware tokens, passkeys) is the next required step.
FIDO2 hardware security keys (like a YubiKey) and passkeys are phishing-resistant by design — they bind authentication cryptographically to the legitimate domain. An AiTM proxy cannot capture a FIDO2 assertion because the key checks the actual origin URL before signing. For your highest-value accounts — CEO, CFO, IT admin, anyone with privileged access — phishing-resistant MFA is no longer optional. It's the gap between "we have MFA" and "we're actually protected."
Technique 06 — Phantom IT Helpdesk
This one is subtle because the attacker calls you — not the other way around. The attack begins with a spoofed caller ID showing your IT support team's number. The caller claims to be from IT and says they've detected a problem with your account: a failed login from an unusual location, a virus alert, a compliance issue. They need to walk you through a fix right now.
The "fix" involves one of several things: approving an MFA push notification that the attacker is simultaneously triggering from their own login attempt; installing remote access software ("just download this tool so I can fix it for you"); or reading back a code sent to your phone — which is actually an account recovery code. Each of these gives the attacker exactly what they need while the victim believes they're following legitimate IT instructions.
This technique is called MFA fatigue bombing when it involves rapid successive MFA push notifications designed to frustrate the target into approving one just to stop them. Microsoft 365 and Duo users have lost accounts to exactly this. The attacker just keeps triggering pushes until, at 2am or mid-meeting, the target approves one to make it stop.
Technique 07 — AI-Powered Spearphishing at Scale
Traditional spearphishing required significant manual effort per target — researching the person, crafting a convincing pretext, writing plausible email copy. That friction kept it targeted to high-value individuals. AI has removed that friction entirely.
Current attack pipelines work like this: automated OSINT tools scrape LinkedIn, company websites, news articles, and social media to build a profile of every employee at a target organisation. An LLM then generates a highly personalised email for each individual, referencing their specific role, recent activity, current events in their industry, and mimicking the communication style of their organisation. The emails are grammatically flawless, contextually plausible, and free of every traditional phishing indicator.
One particularly dangerous variant is the internal thread hijack. Having compromised one inbox, the attacker injects a reply into an existing email thread — continuing an active conversation between real colleagues — with a malicious link or attachment. The recipient sees a conversation they've been part of for days, a name they recognise, a topic they were already discussing, and a plausible next step. Click rates on this technique are dramatically higher than cold phishing.
Your Practical Defence Playbook
These attacks are sophisticated. Your defences don't need to be complicated — they need to be consistent. The majority of social engineering attacks succeed not because they're technically unstoppable, but because the human target was never given a clear rule to follow when it happened.
Every one of these techniques is designed to exploit trust and urgency simultaneously. Trust in a familiar voice, a known face, an ongoing conversation. Urgency that bypasses the pause-and-verify instinct. The single most effective defence you can install in your organisation is a culture where slowing down to verify is explicitly rewarded — not treated as an inconvenience or a sign of distrust. The two-minute delay to call back is not paranoia. It's the control.
How Would Your Team Actually Perform?
Greyhat4Hire runs controlled social engineering simulations — including vishing, smishing, and spearphishing — to show you exactly where your human defences break down before a real attacker finds out first.