Record Losses from Voice Phishing Scams in South Korea

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 
July 17, 2025 3 min read

South Korea's Voice Phishing Losses

Total losses from voice phishing scams in South Korea have surged to a record high of 197 billion won ($149 million) in 2023, marking a 35.4 percent increase from the previous year. The average loss per victim has reached approximately $12,996, which is a staggering 50% increase compared to the year prior. This trend illustrates the growing sophistication of scams targeting individuals and emphasizes the need for enhanced awareness and prevention measures.

Voice phishing scams cost $12,996 in losses per victim, up 50% from year earlier
Image courtesy of The Korea Times

The Financial Supervisory Service reported that these scams have increasingly utilized advanced technologies, making them more difficult to detect. Victims are often deceived into believing they are communicating with legitimate entities, which has led to a rise in the sophistication of the techniques used by scammers. For comprehensive insights on voice phishing scams, refer to the Korea Times.

North Korea's Evolving Phishing Tactics

The phishing landscape has drastically changed, particularly with North Korea's use of advanced Artificial Intelligence (AI) technologies. The phishing operations targeting researchers, analysts, and academics related to North Korean issues have become more precise, leveraging social engineering tactics and generative AI for reconnaissance and payload delivery.

Junotane Korea
Image courtesy of Substack

These phishing attacks have primarily targeted individuals who pose an indirect threat to the regime, such as scholars and policymakers. The use of AI has significantly enhanced the credibility and speed of these attacks, making detection increasingly challenging. For more information on North Korea's tactics, see the full article on Substack.

AI-Enhanced Pig Butchering Scams

Pig butchering scams are rapidly evolving due to the integration of AI technologies. Scammers are utilizing deepfake videos, voice cloning, and AI chatbots to create convincing identities that can manipulate victims into transferring funds or investing in fraudulent schemes.

Merkle Science Icon
Image courtesy of Merkle Science

In February 2024, a notable case involved a finance employee at Arup, who fell victim to a deepfake scam that resulted in a loss of $25 million. The sophistication of these scams highlights the urgent need for effective detection and prevention strategies. For detailed insights, read more on Merkle Science.

The use of language models has also allowed scammers to bypass language barriers, significantly broadening their target audience. They can now effectively communicate in multiple languages, further enhancing their reach and effectiveness. This evolution in scamming tactics necessitates robust countermeasures and increased vigilance from both individuals and organizations.

Tracking and Preventing Phishing and Scam Activities

As the volume of phishing and scam operations continues to grow, tracking these activities has never been more critical. Tools such as blockchain analytics are proving effective in tracing the financial trails of these scams. Advanced platforms like Merkle Science’s Tracker can identify suspicious transaction flows, aiding in the fight against rising fraud.

For comprehensive analysis and solutions tailored to combat these evolving threats, businesses and individuals should consider leveraging advanced tools and technologies. Explore how undefined can assist in enhancing your security measures and protecting against sophisticated phishing and scam tactics.

Alan V Gutnov
Alan V Gutnov

Director of Strategy

 

MBA-credentialed cybersecurity expert specializing in Post-Quantum Cybersecurity solutions with proven capability to reduce attack surfaces by 90%.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article