Thursday, January 30, 2025
HomePhishingTech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into...

Tech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into Scam Pages

Published on

SIEM as a Service

Follow Us on Google News

Scammers continue to adapt with new techniques to trick user’s and make them fall as a victim. Scammers always impose limits such as “call immediately” or “Offer Valid Today only” to make you act on it immediately.

Security researchers from Symantec spotted a new Tech Support Scam that adopts to call optimization service for inserting the phone numbers to scam pages to make it looks more legitimate.

Tech Support Scam

Attackers somehow manage users to get visited a malicious website, commonly through malvertising or compromised website.

Generally, tech support scam’s perform fingerprinting, according to researchers “this particular scam goes a step further and retrieves the browser version as well and redirects the user based on the browser name and version”.

Tech Support Scam

Also, it play’s audio in the background stating that the computer is infected once the user arrives at the scam page.

Then it inform’s users that their computer has been blocked due to a malware infection and tempt user’ to call the number displayed on the screen for assistance.

According to Symantec research, the scam page uses a call optimization service’s advanced JavaScript integration service that return’s scammer phone number from the server and triggers a call back function.

Tech Support Scam

By having the call optimization enabled, attackers, make sure correct phone number displayed to the user’s based in multiple countries.

Recently a sophisticated Apple Phishing Scam notifies the user’s that their account has been limited due to unusual activity and ask’s for payment details and the site was encrypted with Advanced Encryption Standard (AES).

Also Read

Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Beware of Apple Phishing Scam that Threatens Users to Disclose Personal Details

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Cybercriminals Hijack Government Sites to Lauch Phishing Attacks

Cybersecurity researchers have identified a persistent trend in which threat actors exploit vulnerabilities in...

New SMS-Based Phishing Tool ‘DevilTraff’ Enables Mass Cyber Attacks

Cybersecurity experts are sounding the alarm about a new SMS-based phishing tool, Devil-Traff, that...