Author
CEO & Co-Founder, GhostEye
Research on help desk compromise, adversary simulation, and the voice channel security failures most enterprise programs still do not test.
Previously on the BlackRock red team and in offensive cyber operations at MITRE.
Recent Research
Across more than 1,000 IVR tests, nearly half leaked enough intelligence to compromise a help desk in under 20 minutes. If the phone system can validate identities and preview the help desk's questions, it belongs inside your security boundary.
Help desk compromise usually starts well before the call. By the time an agent picks up, the attacker may already have validated identities, mapped the org, and rehearsed the verification path through the IVR.
Most IVRs reveal which accounts are real, how teams are organized, and what language the company uses before a caller ever reaches an employee. That gives attackers a reconnaissance layer most security programs never test.