Tuesday, June 18, 2024

Cybercriminals Impersonate as Cybersecurity Firms in Callback Phishing Campaigns

Threat actors have begun impersonating prominent security companies in a new callback phishing campaign. The primary purpose of this campaign is to make the victims download the malware by tricking them with stealthy instructions.

In this campaign, CrowdStrike Intelligence is among the ones that were mimicked by the attackers. And it’s the main reason CrowdStrike Intelligence researchers discovered this new malicious campaign.

Upon receiving the phishing email, the recipient is instructed to call the included phone number, implying the recipient’s company has been compromised.

There is a high probability that this campaign will consist of the following components:-

  • Legitimate RATs 
  • Penetration testing tools
  • Ransomware

Technical Assessment

The callback campaign uses emails that look like they’re from prominent security companies to send out messages asking you for your phone number. 

The message proclaims that the recipient’s network might have been compromised by some of the security company’s technology. There is always an option for the recipient to call a specific phone number, as was the case with prior callback campaigns.

The operators of this malicious Callback campaign try to convince the victims to install RATs on their systems. While doing so, they gain a foothold on the network in order to gain a competitive advantage.

There is a high probability that the callback operators will attempt to monetize their activities by using ransomware. As of now, CrowdStrike Intelligence is unable to confirm which variant is being utilized by the attackers.

In the context of cybersecurity enterprises, this is believed to be the first known callback campaign that poses as an enterprise. Given the importance of cyber breaches, and the urgency of the campaign, it is more likely to succeed in the near future.

It has become increasingly common that legitimate departments within the organization, as well as outside the organization, are contacting users.

This is why it is crucial that the user understands how and why they are contacted, and this stretches far beyond the cybersecurity aspects of the contact.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

Singapore Police Arrested Two Individuals Involved in Hacking Android Devices

The Singapore Police Force (SPF) has arrested two men, aged 26 and 47, for...

CISA Conducts First-Ever Tabletop Exercise Focused on AI Cyber Incident Response

On June 13, 2024, the Cybersecurity and Infrastructure Security Agency (CISA) made history by...

Europol Taken Down 13 Websites Linked to Terrorist Operations

Europol and law enforcement agencies from ten countries have taken down 13 websites linked...

New ARM ‘TIKTAG’ Attack Impacts Google Chrome, Linux Systems

Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data.ARM's...

Operation Celestial Force Employing Android And Windows Malware To Attack Indian Users

A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...

Hackers Employing New Techniques To Attack Docker API

Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles