Wednesday, March 19, 2025
HomePhishingTech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into...

Tech Support Scams Integrates Call Optimization Service to Insert Phone Numbers into Scam Pages

Published on

SIEM as a Service

Follow Us on Google News

Scammers continue to adapt with new techniques to trick user’s and make them fall as a victim. Scammers always impose limits such as “call immediately” or “Offer Valid Today only” to make you act on it immediately.

Security researchers from Symantec spotted a new Tech Support Scam that adopts to call optimization service for inserting the phone numbers to scam pages to make it looks more legitimate.

Tech Support Scam

Attackers somehow manage users to get visited a malicious website, commonly through malvertising or compromised website.

Generally, tech support scam’s perform fingerprinting, according to researchers “this particular scam goes a step further and retrieves the browser version as well and redirects the user based on the browser name and version”.

Tech Support Scam

Also, it play’s audio in the background stating that the computer is infected once the user arrives at the scam page.

Then it inform’s users that their computer has been blocked due to a malware infection and tempt user’ to call the number displayed on the screen for assistance.

According to Symantec research, the scam page uses a call optimization service’s advanced JavaScript integration service that return’s scammer phone number from the server and triggers a call back function.

Tech Support Scam

By having the call optimization enabled, attackers, make sure correct phone number displayed to the user’s based in multiple countries.

Recently a sophisticated Apple Phishing Scam notifies the user’s that their account has been limited due to unusual activity and ask’s for payment details and the site was encrypted with Advanced Encryption Standard (AES).

Also Read

Top Cybercrime Tactics and Techniques Q2 2018 Cryptomining, GrandCrab, SamSam & VPNFilter

Best ways to Lock Down the Highly Sensitive Data From the Massive Breaches

Beware of Apple Phishing Scam that Threatens Users to Disclose Personal Details

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

US Sperm Donor Giant California Cryobank Hit by Data Breach

California Cryobank, a leading sperm donation facility based in Los Angeles, has been impacted...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Hackers Exploit Hard Disk Image Files to Deploy VenomRAT

In a recent cybersecurity threat, hackers have been using virtual hard disk image files...

Squid Werewolf Mimics Recruiters to Target Job Seekers and Steal Personal Data

In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid...