Monday, February 10, 2025
HomeCyber AttackCybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

Published on

SIEM as a Service

Follow Us on Google News

Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is to make the victims download the malware by tricking them with stealthy instructions.

In this campaign, CrowdStrike Intelligence is among the ones that were mimicked by the attackers. And it’s the main reason CrowdStrike Intelligence researchers discovered this new malicious campaign.

Upon receiving the phishing email, the recipient is instructed to call the included phone number, implying the recipient’s company has been compromised.

There is a high probability that this campaign will consist of the following components:-

  • Legitimate RATs 
  • Penetration testing tools
  • Ransomware

Technical Assessment

The callback campaign uses emails that look like they’re from prominent security companies to send out messages asking you for your phone number. 

The message proclaims that the recipient’s network might have been compromised by some of the security company’s technology. There is always an option for the recipient to call a specific phone number, as was the case with prior callback campaigns.

The operators of this malicious Callback campaign try to convince the victims to install RATs on their systems. While doing so, they gain a foothold on the network in order to gain a competitive advantage.

There is a high probability that the callback operators will attempt to monetize their activities by using ransomware. As of now, CrowdStrike Intelligence is unable to confirm which variant is being utilized by the attackers.

In the context of cybersecurity enterprises, this is believed to be the first known callback campaign that poses as an enterprise. Given the importance of cyber breaches, and the urgency of the campaign, it is more likely to succeed in the near future.

It has become increasingly common that legitimate departments within the organization, as well as outside the organization, are contacting users.

This is why it is crucial that the user understands how and why they are contacted, and this stretches far beyond the cybersecurity aspects of the contact.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...