A man invested $4 million in bitcoin and lost it all with a single click when he was targeted by a vishing scam, which uses phone calls to trick people.
Many of us have families to look after. We save money not only for our own future but also – perhaps even more so – for our kids and grandkids. We want to secure a good education, help them buy a home or simply set aside something for when they need it.
So did Tony. He’d saved a substantial amount for his sons’ future, more than $4 million in bitcoin. And with just one click, he lost it all to vishing, a type of scam that uses phone calls to trick people into giving up sensitive information.
Scammers posed as Google Support agents and, after an elaborate scheme, first caught his attention, then gained his trust and ultimately left him with nothing.
“Please, man. Is there anything you can do to give me something back?” was Tony’s final, desperate plea to the scammers, hoping to appeal to their humanity.
Vishing, short for “voice phishing,” is a type of cybercrime that uses phone calls to deceive individuals into revealing personal or financial information. Unlike traditional phishing, which relies on emails or text messages, vishing leverages the power of human voice and social engineering to manipulate victims. Scammers often impersonate legitimate organizations, such as banks, tech companies, or government agencies, to gain trust and create a sense of urgency. They may ask for passwords, credit card numbers, or other sensitive details, which they then use for fraudulent purposes.
Because vishing relies heavily on social engineering tactics, it can be difficult to detect, making it a particularly dangerous form of cybercrime.
BEST ANTIVIRUS FOR MAC, PC, IPHONES AND ANDROIDS – CYBERGUY PICKS
Let’s break down these vishing schemes to understand why they are so effective. Once you see them as a staged play consisting of different acts, it becomes easier to recognize the individual tactics.
Scammers start by identifying potential victims through social media, public transaction records, leaked databases, and more. Once they select a target, they gather personal details (email, phone number, financial holdings) to build credibility. And you could easily be a target. That’s because data brokers – companies that buy and sell your personal information – are goldmines for scammers. Your entire profile is likely out there, containing everything they need to run a successful scam: your name, address, contact details, family members, owned properties and more.
How to protect yourself at this stage:
Scammers always initiate contact first. Let’s walk through a vishing scam using a Google account as an example.
How to protect yourself at this stage:
HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET
Scammers no longer ask for passwords outright. That trick doesn’t work anymore. Here’s what they do instead.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
After you successfully reset your password, scammers ask for one final step: log in. This is where the real scam happens.
How to protect yourself at this stage:
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
At this stage, the scammers end the call, leaving you feeling at ease. You won’t realize what happened until it’s too late. And it’s not just Google accounts at risk. The same method can be used to access Apple accounts, banking services and cryptocurrency wallets. For some, losing access to Google alone is devastating; after all, Google Drive, Google Photos and other cloud services store vast amounts of personal and financial data. But by the time you realize what’s happened, it’s already too late.
How to protect yourself at this stage:
While securing your accounts and reporting fraud are crucial after a scam has already occurred, the best defense is preventing these attacks in the first place. Taking these steps can help ensure you don’t fall victim to a vishing scam in the first place.
1. Invest in personal data removal services: These scams all have one thing in common: they need some of your personal info to work. Without your name, phone number or email, these scams can’t happen. Scammers might even try to gain your trust by sharing more of your personal info, like your Social Security number, to seem more believable. I strongly suggest you remove your personal info from people search sites online. If you give someone your email or phone number, they might be able to find your home address through a reverse search. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.
2. Set up recovery contacts: Establish backup contacts for your accounts (Google, Apple and bank) to ensure you have a way to regain access if locked out.
3. Monitor financial accounts: Regularly check your financial accounts for any suspicious activity or unauthorized transactions.
GET FOX BUSINESS ON THE GO BY CLICKING HERE
4. Enable two-factor authentication (2FA): Enable 2FA on all accounts, especially Google, Apple and financial services. This adds an extra layer of security, making it harder for scammers to access your accounts even if they obtain your login credentials.
5. Secure devices: Ensure your devices are secured with screen locks or biometric authentication and keep software up to date to prevent malware attacks.
6. Report scams promptly: If you’ve been scammed, report the fraud immediately to the FTC at reportfraud.ftc.gov and notify the affected platforms.
7. Use strong antivirus software: Install and regularly update strong antivirus software to protect your devices from malware, viruses and other cyber threats. Antivirus software provides real-time protection, scans for malicious files and helps prevent infections by blocking access to harmful websites and downloads. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
Tony’s story is a chilling reminder that even the most diligent savers can fall victim to sophisticated scams. These vishing schemes, carefully orchestrated like a theatrical play, exploit our trust and leverage real security alerts to gain access to our accounts. Protecting ourselves requires constant awareness, skepticism towards unsolicited communications, and proactive measures to safeguard our personal information. While the tactics may evolve, the underlying principle remains the same: scammers rely on deception to exploit our vulnerabilities. By understanding their methods and taking preventative steps, we can make it harder for them to succeed.
What more do you think companies and the government should do to combat this growing threat? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.