Phishing attacks are getting more and more sophisticated

Zero-day attack
(Image credit: Shutterstock) (Image credit: Shutterstock.com)

Phishing attacks are constantly evolving and the latest versions are the most dangerous yet, a new report suggests.

Cybersecurity researchers from Trellix recently spotted an advanced version of the callback style of attack which, if pulled off successfully, robs the victims of their money, locks their computers with ransomware, and steals identity data in the process.

Callback attacks are exactly as they sound: the scammers call the victim back, and deal the final blow via phone.

Downloading the (anti)virus

This particular campaign starts the usual way, with an email. The victim receives an email confirmation of a purchase they never made, which includes a phone number the person can use to “cancel” the order.

Usually, this is where an attacker would strike, using the phone call to lure the victim into downloading remote access software, and then using that access to install malware, ransomware, or other viruses.

This campaign, however, takes it a step further. When the victims call the provided number, the person on the other end claims to have checked the database and tells them the email is spam. Then, they suggest that the victim’s computer is infected with a virus and tells them a “technical specialist” will reach out later in the day.

The second phone call leads the victim into downloading fake antivirus programs onto their endpoint, which distributes a ClickOnce executable named support.Client.exe, which installs the ScreenConnect remote access tool.

"The attacker can also show a fake lock screen and make the system inaccessible to the victim, where the attacker is able to perform tasks without the victim being aware of them," Trellix said.

The researchers have also discovered a couple of variants to the campaign, one of which distributes fake cancellation forms through which victims share their personal details. To receive the refund, the victims need to log into their bank account. They end up being tricked into sending money to the scammers. 

"This is achieved by locking the victim's screen and initiating a transfer-out request and then unlocking the screen when the transaction requires an OTP (One Time Password) or a secondary password," Trellix detailed.

"The victim is also presented with a fake refund successful page to convince him into believing that they have received the refund. The scammer may also send an SMS to the victim with a fake money received message as an additional tactic to prevent the victim from suspecting any fraud."

Via BleepingComputer

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Everything you need to know about phishing
Fraude en ligne phishing
Google forced to step up phishing defenses following ‘most sophisticated attack’ it has ever seen
Robotic hand clicking on captcha 'I am not a robot'.
Double clicking danger - experts warn just two clicks can let attackers steal your accounts
mobile phone
Forget phishing, now "mishing" is the new security threat to worry about
Hacker Typing
This devious two-step phishing campaign uses Microsoft tools to bypass email security
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Microsoft warns about a new phishing campaign impersonating Booking.com
Latest in Security
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Oracle
Oracle denies data breach after hacker claims to hold six million records
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
Latest in News
Tesla Roadster 2
Tesla is still taking deposits on its long overdue Roadster, despite promising it would arrive in 2020
Samsung HW-Q990D soundbar with Halloween theme over the top
Samsung promises to repair soundbars bricked by its disastrous software update for free – but it'll probably involve shipping
Google Gemini AI
Gmail is adding a new Gemini AI tool to help smarten up your work emails
DJI Mavic 3 Pro
More DJI Mavic 4 Pro leaks seemingly reveal launch date, price and key features of the triple camera drone – here's what to expect
Android 16 logo on a phone
Here's how Android 16 will upgrade the screen unlocking process on your Pixel
Man sitting on sofa, drinking coffee, looking at phone in surprise
Thousands of coffee lovers warned to stop using their espresso machines immediately after reports of burns and lacerations