Google's incident response teams observed a significant increase in voice phishing attacks targeting corporate IT environments. Attackers are increasingly using social engineering to manipulate employees into revealing credentials or approving MFA requests. This tactic has proven particularly effective for gaining unauthorized access to cloud-based infrastructure, where identity is the primary security perimeter.
The rise of vishing represents a strategic pivot by threat actors toward exploiting human trust rather than technical vulnerabilities. As organizations migrate more assets to the cloud, the identity of the user becomes the most valuable target for attackers. Successful exploitation allows for lateral movement, data exfiltration, and long-term persistence within cloud environments that may lack granular behavioral monitoring.
Advisory purposes only · QPulse Security Intelligence Platform · 2026 · Brief #00388