Cyber security news for all


    Threat actors target workers with a phishing campaign

    Hackers are “changing with the tide”; as they have uncovered more nefarious manners to extort data from people working from home. Looking for new angles to socially engineer employees working from home under COVID-19 conditions, attackers have devised a new phishing campaign that distributes emails that look as if they were generated by  Private Branch Exchange (PBX).

    PBX incorporates emails of employees and enables them to receive voicemail recordings. The phishing actors have taken advantage of this fact to extort valuable data from employees.

    They create deceitful emails with convincing subject lines with the full intent of deceiving recipients and making them believe they have new messages.

    These subject lines, as well as, the sender name are sometimes customized to incorporate a precise person or company’s name. Thereby cementing the legitimacy.

    Iron scale, a cybersecurity vendor, released a blog post on Thursday concerning the issue. In the blog post, they stated that their researchers detected the malicious activities last month; and at least 100,000 mailboxes from various sectors have been jeopardized.

    In an email interview, an Ironscale spokesperson told SC media; “the attackers are looking to get the recipient to open the malicious attachment to drive to a fake landing page for credential harvesting. The recipient has to enter their O365 login credentials to access the voicemail recording.”

    Due to the absence of a malicious payload in the email, which usually triggers detection, the emails evade the DMARC authentication protocol and easily circumvents security.

    The Vice President of Pre-Sales Engineering/Director Of Engineering – Americas Ian Baxter sheds more light on the threat; “it may seem odd for attackers to create phishing websites spoofing PBX integrations as most voicemails are quite benign in the information shared, however, attackers know that the credentials could be used for multiple other logins, including for websites with valuable PII or business information. In addition, any sensitive information left in the voicemail could potentially be used for a social engineering attack.”

    The hackers have shown that there’s no barrier they can’t break. Whether pre out break or post-outbreak.

    Recent Articles

    Related Stories