Recognizing Fake IT Support Calls & Vishing | UAE Guide

Recognizing Fake IT Support Calls (Vishing Attacks)

Introduction

Cybercriminals are increasingly targeting UAE businesses through phone calls, not just emails. Known as "vishing" (voice phishing), these attacks involve criminals calling employees and posing as IT support technicians, Microsoft representatives, telecom providers like Etisalat or du, or even your company's own IT team. The goal is simple: trick your staff into handing over passwords, remote access credentials, or sensitive business data — all without a single malicious email being sent.

For SMEs in Dubai, Abu Dhabi, and across the UAE, vishing attacks are particularly dangerous because most employees are not trained to be suspicious of phone calls the way they are of suspicious emails. The caller sounds professional, uses technical jargon, and creates a sense of urgency — "Your account is about to be suspended" or "We've detected a virus on your computer." Without proper awareness training, even well-meaning staff can fall victim and compromise the entire business.

How Vishing Attacks Work: Common Scenarios in the UAE

Understanding the tactics used by vishing attackers helps your team recognise and resist them. Here are the most common vishing scenarios reported in the UAE business environment:

  • Fake Microsoft/Windows Support: The caller claims to be from "Microsoft Technical Support" and tells the victim their Windows licence has expired or their computer is sending error reports. They direct the victim to download remote access software (like AnyDesk or TeamViewer) to "fix" the problem — and once connected, they steal data or install malware.
  • Fake Telecom Provider Calls: The caller pretends to be from Etisalat, du, or Virgin Mobile UAE and claims there's an issue with your business internet account. They request account credentials or a one-time password (OTP) to "verify" the account — which they then use to access your telecom account.
  • Internal IT Impersonation: The caller claims to be from your company's IT department and says they need your username and password to perform an urgent system update. Legitimate IT teams never ask for passwords by phone.
  • Bank or Payment Processor Fraud: Particularly relevant in UAE's trading and retail sectors, callers impersonate bank security teams warning of "suspicious transactions" and requesting card details or OTPs to "cancel the transaction."
  • HR and Payroll Scams: Attackers call payroll or HR staff claiming to be employees requesting urgent bank account changes for salary payments — a common Business Email Compromise variation conducted over the phone.

How to Protect Your UAE Business from Vishing Attacks

Train your team to never share passwords by phone: No legitimate IT support team — including Al Aida IT Technology — will ever ask for your password over the phone. This rule should be absolute and communicated clearly to all staff in your onboarding and security training sessions.

Verify caller identity before taking action: If someone calls claiming to be from your IT provider, Microsoft, or a telecom company, hang up and call them back using the official number from their website. Do not use any number the caller provides — attackers use spoofed numbers and fake call-back numbers.

Implement a callback policy for IT requests: Establish a clear policy that any IT-related request received by phone — password resets, remote access grants, account changes — must be verified through your official IT support email or ticket system before action is taken.

Be sceptical of urgency: Vishing attacks almost always involve artificial urgency ("Your account will be suspended in 10 minutes" or "We detected a virus right now"). Real technical issues rarely require immediate, unplanned action. Encourage staff to pause, question, and verify.

Report suspicious calls: In the UAE, phone scams can be reported to TDRA (Telecommunications and Digital Government Regulatory Authority) and to Dubai Police's e-crime reporting portal at ecrime.ae. Reporting helps protect other businesses.

Need Help? Al Aida IT Has You Covered

If your business is struggling with cybersecurity awareness or staff security training, our team at Al Aida IT Technology LLC provides expert managed IT support, cybersecurity, cloud solutions, and IT Annual Maintenance Contracts (AMCs) across Dubai, Abu Dhabi, Sharjah, and the wider GCC region.

We respond within 1 business hour. Request a free IT consultation today — no obligation.

    • Related Articles

    • What Is Phishing and How to Spot Fake Emails in the UAE

      Introduction Phishing attacks are the single most common cybersecurity threat facing UAE businesses today. Whether you run a trading company in Dubai, a construction firm in Abu Dhabi, or a professional services practice in DIFC, your employees ...
    • Protect Your Business from Ransomware Attacks in 2024

      Ransomware attacks have become one of the most prevalent cyber threats globally, and the UAE is no exception. According to recent reports, over 50% of cyber incidents in the region are ransomware-related. As businesses continue to adopt digital ...
    • Protecting Your Business with Cloud Security Best Practices

      Cloud computing has revolutionized the way businesses in the UAE and GCC operate, offering flexibility, scalability, and efficiency. However, with these benefits come security risks, and protecting your data in the cloud is crucial. This article ...
    • Why Your Antivirus Alone Is Not Enough in 2025

      Introduction If you ask most small business owners in Dubai and across the UAE whether their computers are protected, the answer will almost always be: "Yes, we have antivirus." For years, antivirus software was the cornerstone of business ...
    • What Is Business Email Compromise (BEC) and How to Avoid It

      Introduction Business Email Compromise (BEC) is one of the most financially devastating cybercrimes targeting UAE businesses. Unlike malware or ransomware, BEC doesn't require technical hacking skills — it exploits human trust and business processes. ...