Threat frameworks

A working vocabulary for AI-era communications threats.

Vercon publishes a living set of frameworks that name the attacks we see most often in voice, AI-agent, and omnichannel intake systems. Each framework is paired with a defensive posture our consultants use in live engagements.

SCISynthetic Caller Injection

Adversaries inject synthetic, AI-generated callers into intake workflows to extract data, trigger actions, or overwhelm verification controls.

Includes scripted voice agents, cloned-voice callers, and orchestrated multi-call campaigns designed to defeat caller verification, exhaust agent attention, or seed fraudulent records.

VDoSVoice Denial of Service

Coordinated voice traffic intended to exhaust queue capacity, deny legitimate callers access, and create cover for higher-value attacks.

Often paired with social engineering on adjacent channels; modern VDoS is cheap to launch with AI dialers and difficult to distinguish from organic surge.

CPEConversational Prompt Exploitation

Manipulation of AI voice agents and chatbots through adversarial prompts, jailbreaks, and instruction overrides delivered inside ordinary-looking conversations.

Exploits the gap between an agent's safety policy and its operational tools, often producing hallucinated commitments, leaked context, or unauthorized actions.

CCICross-Channel Impersonation

An attacker uses one channel to legitimize another, pivoting from email to phone or SMS to chat to defeat single-channel verification.

Most omnichannel fraud relies on this pattern; defending against it requires verification that holds across channels, not within them.

AIAAI Agent Abuse

Misuse of an organization's own AI agents to perform fraudulent tasks, leak data, or commit the organization to actions outside its policy.

Includes refund manipulation, policy fabrication, unauthorized escalation, and exploitation of tool-use permissions granted to autonomous agents.

VIMVerified Identity Manipulation

Defeating identity verification by exploiting weaknesses in OSINT-resistant questions, knowledge-based authentication, and recovery flows.

Most legacy verification questions are answerable from public sources; VIM defense requires question design and workflow controls that assume the attacker has done their research.

HAFHuman-AI Handoff Failure

Failures at the boundary between AI agents and human staff, including lost context, dropped intent, and verification re-runs that attackers exploit.

The handoff is one of the most fragile points in any AI-first workflow; designing it to preserve verification state is a non-trivial and underweighted control.

SRSSurge Response Sabotage

Attackers exploit surge conditions, real or manufactured, to push fraudulent requests through queues operating in degraded mode.

Disaster response, breach disclosure, and product launches all create predictable surge windows; SRS defense requires degraded-mode workflows that prioritize verification over throughput.

IFXIntake Fraud Exploitation

Manipulation of customer or job intake workflows to fabricate records, trigger dispatches, or commit downstream resources fraudulently.

Especially common in restoration, home services, and emergency response, where intake commits operational capacity before verification has occurred.

DCIDeepfake Caller Impersonation

Use of cloned-voice or video deepfakes to impersonate executives, vendors, or customers in real-time conversations.

Cost of a convincing voice clone is now trivial; the defensive posture is workflow-level rather than detection-level.

Find out where your communications channels are exposed.

A Vercon Communications Security Assessment delivers an executive-readable risk report and a prioritized remediation roadmap — typically within four weeks.