Thursday, February 27, 2025
HomeCyber Security NewsBeware Of Callback Phishing Attacks Google Groups That Steal Login Details

Beware Of Callback Phishing Attacks Google Groups That Steal Login Details

Published on

SIEM as a Service

Follow Us on Google News

Callback phishing is a two-step attack involving phishing emails and phone calls. Victims are lured into calling a bogus number in the email, where attackers impersonate legitimate entities and trick victims into divulging sensitive information or downloading malware.

The BazarCall scheme employed a text-based phishing email to lure victims into calling a malicious phone number.

The number impersonating Binance falsely claimed a withdrawal of a significant amount of money. 

However, the sender domain was not legitimate, and Binance does not use a hotline for customer support, which bypasses traditional email security measures.

Join ANY.RUN's FREE webinar on How to Improve Threat Investigations on Oct 23 - Register Here 

Text-based phishing
Text-based phishing

Spammers use text obfuscation to hide their messages from detection. Base64 encoding and invisible characters made the email appear normal while being difficult to parse, highlighting the importance of carefully examining email headers and content to identify phishing attempts.

By embedding malicious content in attachments or images, they bypass spam filters, while image-based spam uses image file extensions to hide text content.

They often use PDF, .txt, and .doc files in phishing emails to trick victims into opening malicious attachments. These attachments can contain fake invoices or other fraudulent information, leading to financial losses or identity theft.

Fake YouTube invoice
Fake YouTube invoice

The phishing attack leverages a legitimate scheduling platform to trick victims into providing personal information disguised as a QuickBooks upgrade notification. The email prompts victims to schedule a meeting with a fake support representative. 

Con artists can obtain the victims’ contact information through the scheduling process and exploit it to launch additional attacks.

QuickBooks phishing
QuickBooks phishing

A Calendly link allows victims to schedule a meeting and enter their contact details, which are used for further scams. The scammer’s Calendly account contains multiple fake QuickBooks events.

Cybercriminals exploit legitimate fintech platforms to send deceptive emails. They use these platforms’ credibility to disguise malicious links and requests, luring victims into providing sensitive information or clicking on malicious links.

Callback sent using Paypal
Callback sent using Paypal

Xero and HoneyBook, cloud-based accounting and project management platforms, are being exploited by fraudsters to send callback phishing emails. 

According to Trustwave, these emails, disguised as legitimate invoices or payment notifications, contain fake contact information and a sense of urgency to induce victims to call a bogus number.

Organizations should regularly train employees to identify and avoid phishing attempts.

These attempts often rely on social engineering tactics, which involve verifying email authenticity, avoiding unsolicited phone calls, and closely monitoring financial accounts for unauthorized activity.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide (PDF)

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...

Threat Actors Using Ephemeral Port 60102 for Covert Malware Communications

Recent cybersecurity investigations have uncovered a sophisticated technique employed by threat actors to evade...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Silver Fox APT Hackers Target Healthcare Services to Steal Sensitive Data

A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver...

Ghostwriter Malware Targets Government Organizations with Weaponized XLS File

A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group...

LCRYX Ransomware Attacks Windows Machines by Blocking Registry Editor and Task Manager

The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its...