Friday, November 15, 2024
HomeCyber AttackCybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

Published on

Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is to make the victims download the malware by tricking them with stealthy instructions.

In this campaign, CrowdStrike Intelligence is among the ones that were mimicked by the attackers. And it’s the main reason CrowdStrike Intelligence researchers discovered this new malicious campaign.

Upon receiving the phishing email, the recipient is instructed to call the included phone number, implying the recipient’s company has been compromised.

- Advertisement - SIEM as a Service

There is a high probability that this campaign will consist of the following components:-

  • Legitimate RATs 
  • Penetration testing tools
  • Ransomware

Technical Assessment

The callback campaign uses emails that look like they’re from prominent security companies to send out messages asking you for your phone number. 

The message proclaims that the recipient’s network might have been compromised by some of the security company’s technology. There is always an option for the recipient to call a specific phone number, as was the case with prior callback campaigns.

The operators of this malicious Callback campaign try to convince the victims to install RATs on their systems. While doing so, they gain a foothold on the network in order to gain a competitive advantage.

There is a high probability that the callback operators will attempt to monetize their activities by using ransomware. As of now, CrowdStrike Intelligence is unable to confirm which variant is being utilized by the attackers.

In the context of cybersecurity enterprises, this is believed to be the first known callback campaign that poses as an enterprise. Given the importance of cyber breaches, and the urgency of the campaign, it is more likely to succeed in the near future.

It has become increasingly common that legitimate departments within the organization, as well as outside the organization, are contacting users.

This is why it is crucial that the user understands how and why they are contacted, and this stretches far beyond the cybersecurity aspects of the contact.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin,...

CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added...

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new...

Chinese National Faces 20 Years of Jail Time for Laundering Millions in Crypto

Daren Li, 41, a dual citizen of China and St. Kitts and Nevis, and...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

4M+ WordPress Websites to Attacks, Following Plugin Vulnerability

A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin,...

CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added...

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new...