Record Losses from Voice Phishing Scams in South Korea

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 3 min read

South Korea's Voice Phishing Losses

Total losses from voice phishing scams in South Korea have surged to a record high of 197 billion won ($149 million) in 2023, marking a 35.4 percent increase from the previous year. The average loss per victim has reached approximately $12,996, which is a staggering 50% increase compared to the year prior. This trend illustrates the growing sophistication of scams targeting individuals and emphasizes the need for enhanced awareness and prevention measures.

Voice phishing scams cost $12,996 in losses per victim, up 50% from year earlier
Image courtesy of The Korea Times

The Financial Supervisory Service reported that these scams have increasingly utilized advanced technologies, making them more difficult to detect. Victims are often deceived into believing they are communicating with legitimate entities, which has led to a rise in the sophistication of the techniques used by scammers. For comprehensive insights on voice phishing scams, refer to the Korea Times.

North Korea's Evolving Phishing Tactics

The phishing landscape has drastically changed, particularly with North Korea's use of advanced Artificial Intelligence (AI) technologies. The phishing operations targeting researchers, analysts, and academics related to North Korean issues have become more precise, leveraging social engineering tactics and generative AI for reconnaissance and payload delivery.

Junotane Korea
Image courtesy of Substack

These phishing attacks have primarily targeted individuals who pose an indirect threat to the regime, such as scholars and policymakers. The use of AI has significantly enhanced the credibility and speed of these attacks, making detection increasingly challenging. For more information on North Korea's tactics, see the full article on Substack.

AI-Enhanced Pig Butchering Scams

Pig butchering scams are rapidly evolving due to the integration of AI technologies. Scammers are utilizing deepfake videos, voice cloning, and AI chatbots to create convincing identities that can manipulate victims into transferring funds or investing in fraudulent schemes.

Merkle Science Icon
Image courtesy of Merkle Science

In February 2024, a notable case involved a finance employee at Arup, who fell victim to a deepfake scam that resulted in a loss of $25 million. The sophistication of these scams highlights the urgent need for effective detection and prevention strategies. For detailed insights, read more on Merkle Science.

The use of language models has also allowed scammers to bypass language barriers, significantly broadening their target audience. They can now effectively communicate in multiple languages, further enhancing their reach and effectiveness. This evolution in scamming tactics necessitates robust countermeasures and increased vigilance from both individuals and organizations.

Tracking and Preventing Phishing and Scam Activities

As the volume of phishing and scam operations continues to grow, tracking these activities has never been more critical. Tools such as blockchain analytics are proving effective in tracing the financial trails of these scams. Advanced platforms like Merkle Science’s Tracker can identify suspicious transaction flows, aiding in the fight against rising fraud.

For comprehensive analysis and solutions tailored to combat these evolving threats, businesses and individuals should consider leveraging advanced tools and technologies. Explore how undefined can assist in enhancing your security measures and protecting against sophisticated phishing and scam tactics.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

By Edward Zhou July 19, 2025 3 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article