Vishing attacks often begin with a phone call, where the attacker impersonates a trusted entity—such as a bank, government official, or tech support representative. The caller may use high-pressure tactics or create a sense of urgency to compel the victim to take immediate action. For example, they might claim that suspicious activity has been detected on the victim’s account and request verification of sensitive information to “protect” the account.