Published on: 2/11/2026
4 minute read
The call that sounded helpful—and wasn’t
Late one morning, just after finishing her coffee, my mother-in-law answered the phone. The timing felt ordinary, even reassuring. It wasn’t the middle of the day, when robocalls usually flood in. And the woman on the line sounded polite, professional, and local.
She said my mother-in-law’s new Medicare card was already in the mail.
That sounded like good news. It had been a long time since a replacement card had been issued. My mother-in-law was genuinely pleased. When the caller asked her to confirm her Medicare number and address, she complied. The caller continued chatting — about medications, medical history, and coverage. Nothing felt rushed. Nothing sounded suspicious.
The entire call lasted less than an hour.
Then my father-in-law took the phone. He shared his information too.
Only later did the alarm bells begin to ring.
This is how a vishing attack works.
What is a vishing attack?
Vishing is short for voice phishing. It’s a scam carried out over the phone, designed to trick people into sharing sensitive information like Medicare numbers, Social Security numbers, insurance details, or banking data.
Unlike robocalls, vishing relies on conversation. The caller sounds helpful. Sometimes they sound friendly. Often, they sound exactly like someone who belongs on the other end of the line.
That is not an accident.
How this attack worked
This call succeeded because it followed a familiar script:
- It sounded official: Medicare was mentioned immediately
- It delivered good news: a new card was “already on the way”
- It asked for confirmation, not secrets: “just verifying” information
- It built trust through conversation: health, medications, shared concerns
The caller spoke clearly and without a noticeable accent, something many people still (incorrectly) associate with legitimacy. The longer the conversation continued, the harder it became to question it.
The turning point came when the caller suggested ordering a back brace.
That didn’t feel right.
My mother-in-law hung up.
The caller rang back.
That confirmed it.
Why these scams are getting better
This is not about people being careless. It’s about scams becoming more sophisticated.
Artificial intelligence has dramatically changed social-engineering attacks, scams that manipulate human behavior. With modern tools, scammers can scrape personal data from the internet about almost anyone, at any time, for little to no cost.
Public records, data brokers, social media posts, leaked databases, and even casual online comments can be stitched together in minutes. AI then helps scammers turn that data into believable conversations.
AI allows scammers to:
- Generate natural, friendly scripts in real time
- Remove obvious accents or awkward phrasing
- Personalize calls using age, benefits, or health-related details
- Scale attacks quickly and share “successful” targets across networks
It’s no longer if someone gets targeted — it’s when.
What she did right
Once my mother-in-law realized something was wrong, she acted quickly. The call itself took less than an hour. Trying to put the system on notice took hours.
She contacted:
- The Centers for Medicare & Medicaid Services (CMS)
- Her health insurance provider
She documented what happened and reported the incident—a process that was time-consuming, frustrating, and emotionally draining. But it mattered.
There’s another hard truth: once scammers identify a responsive number, it often gets shared. She soon noticed an increase in scam calls — confirmation that she had been passed along within the network.
That is how modern scam operations work.
Countermeasures: What to do next time
There is no shame in being targeted. The goal is preparation. Here are practical steps anyone can take:
- Don’t answer unknown numbers - Let unfamiliar calls go to voicemail. If it’s legitimate, they will leave a message.
- Remember this rule - Medicare will not call you to ask for your number or address. They already have it.
- Hang up - Then call back safely. If a call claims to be from Medicare or your insurer:
- Hang up
- Call the number on the back of your Medicare card
- Never trust a number provided by the caller
- Treat emails the same way - If you receive an email claiming to be from Medicare:
- Do not click links
- Do not call numbers in the email
- Call the number on your card to verify legitimacy
- Share less online - Personal details shared online (birthdays, health updates, family information) make targeting easier and cheaper.
- Watch the mail - Phone scams are often followed by official-looking mailers designed to reinforce the deception.
- Have an exit line - One of the simplest defenses is permission to disengage: “My daughter-in-law told me to hang up.” Any reason works. You do not owe politeness to a scammer.
- Practice everyday security - Consult the CMS Cybersecurity and Privacy Training & Awareness Handbook for tips on how to practice everyday security.
Key takeaway
This story does not end with blame, and it shouldn’t. Scams today are professional, data-driven, and powered by technology that mimics trust. The people targeted are not careless. They are human.
The safest approach is simple:
- Pause
- Verify
- Trust no one who contacts you first
Because in a world shaped by AI and automation, the most dangerous calls are often the ones that sound the kindest.
About the author
Tamara Kravitz is part of ISPG at CMS, supporting its efforts to strengthen cybersecurity understanding and preparedness. Her background in training, education, and workforce development helps others apply complex security topics in real-world settings. Her work bridges healthcare, technology, and learning for safer digital systems.