The category as it exists in 2026
Deepfake vishing emerged as a distinct attack category through 2023-2024 and became the dominant high-impact whaling pattern in 2025. The category combines voice-cloning technology (which became commodity-priced through 2023) with traditional voice-phishing techniques (which have existed for decades). The combination produces an attack that defeats the legacy out-of-band verification procedures that organisations relied on for two decades.
The pattern works as follows. The attacker harvests public audio of a target executive (earnings calls, conference recordings, podcast appearances, corporate-communications videos). Using a current-generation voice-cloning model, the attacker produces a real-time voice clone capable of synthesising the executive's voice in arbitrary text input. The attacker calls a finance-team or treasury-team employee, impersonating the executive, and requests a high-value action: typically a confidential wire transfer, a banking-detail change, or a sensitive document release. The targeted employee, hearing what sounds like a familiar voice with familiar vocal mannerisms, may attempt to verify the request via the channel under attack (calling the number that called them, joining a video conference with the apparent executive) and find that the verification appears to succeed because the attacker controls the verification channel as well as the request channel.
The Arup Hong Kong case of February 2024 is the canonical reference for the category. The Q1 2025 wave produced $200M+ in publicly-reported losses across the disclosed cohort. The true figure is materially higher because most settled deepfake-vishing losses are not disclosed publicly. The trajectory through 2025-2026 has been one of continued growth in both incident count and per-event loss, with the technical countermeasures remaining structurally behind the offensive capability.[Arup public statement May 2024 + aggregated Q1 2025 SEC 8-K filings + Hoxhunt 2026 vishing surge data]