Sunday, April 27, 2025
HomePhishingTech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into...

Tech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into Scam Pages

Published on

SIEM as a Service

Follow Us on Google News

Scammers continue to adapt with new techniques to trick user’s and make them fall as a victim. Scammers always impose limits such as “call immediately” or “Offer Valid Today only” to make you act on it immediately.

Security researchers from Symantec spotted a new Tech Support Scam that adopts to call optimization service for inserting the phone numbers to scam pages to make it looks more legitimate.

Tech Support Scam

Attackers somehow manage users to get visited a malicious website, commonly through malvertising or compromised website.

- Advertisement - Google News

Generally, tech support scam’s perform fingerprinting, according to researchers “this particular scam goes a step further and retrieves the browser version as well and redirects the user based on the browser name and version”.

Tech Support Scam

Also, it play’s audio in the background stating that the computer is infected once the user arrives at the scam page.

Then it inform’s users that their computer has been blocked due to a malware infection and tempt user’ to call the number displayed on the screen for assistance.

According to Symantec research, the scam page uses a call optimization service’s advanced JavaScript integration service that return’s scammer phone number from the server and triggers a call back function.

Tech Support Scam

By having the call optimization enabled, attackers, make sure correct phone number displayed to the user’s based in multiple countries.

Recently a sophisticated Apple Phishing Scam notifies the user’s that their account has been limited due to unusual activity and ask’s for payment details and the site was encrypted with Advanced Encryption Standard (AES).

Also Read

Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Beware of Apple Phishing Scam that Threatens Users to Disclose Personal Details

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

Compliance And Governance: What Every CISO Needs To Know About Data Protection Regulations

The cybersecurity landscape has changed dramatically in recent years, largely due to the introduction...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...