A brand new wave of focused voicemail phishing assaults has been hitting US firms in chosen verticals since Could 2022. The marketing campaign’s purpose is to gather Workplace 365 credentials of authentic company customers.
E mail phishing campaigns are recurrently hitting organizations within the U.S., however voicemail phishing is much less widespread. A brand new report from Zscaler exposes a brand new assault scheme begun in Could 2022 that goals to gather legitimate credentials for Workplace 365 mailboxes.
All of it begins with an electronic mail
On this assault marketing campaign, an electronic mail is distributed to chose targets. The e-mail is a notification of a brand new voicemail, which could be listened to by opening an attachment file (Determine A).
The From discipline of the e-mail is crafted. In Determine A, it mentions Zscaler as a result of it has focused an worker of the corporate.
In case the encoded electronic mail handle is lacking on the finish of the URL, the consumer is redirected to the Wikipedia web page of Microsoft Workplace or to the Microsoft Workplace web site.
This URL results in a second URL which exhibits a captcha from Google reCaptcha to the consumer.
SEE: Password breach: Why popular culture and passwords don’t combine (free PDF) (TechRepublic)
As soon as the consumer has entered the proper captcha data, they’re proven the ultimate content material, which is an Workplace 365 phishing web page (Determine C).
The researchers have collected URLs associated to that phishing marketing campaign of their telemetry and will decide who the focused organizations are primarily based on the URL. They point out that targets for this phishing marketing campaign are organizations within the U.S. navy, safety software program builders, safety service suppliers, healthcare and pharmaceutical suppliers, and supply-chain organizations in manufacturing and transport.
The ultimate purpose of the attackers stays unknown. The cybercriminals might need to obtain entry to particular mailboxes from companies or get an preliminary foothold to complete company networks to conduct extra fraud or cyberespionage operations.
Not a brand new phishing scheme, however efficient
Erich Kron, safety consciousness advocate with KnowBe4, commented:
“Whereas not a brand new strategy, utilizing voicemail notifications does proceed to be very efficient, as they have an inclination to mix into the forms of notifications which might be a part of our day by day work. Not like many different phishing campaigns, this one does contain extra analysis and energy because the assaults are personalized for every goal. The results of a profitable assault, the theft of a username and password, could be nicely well worth the extra effort, due to the entry to the e-mail account, plus the truth that individuals generally tend to reuse passwords on different programs.
“To guard in opposition to this, workers needs to be educated on methods to spot and report phishing assaults, and methods to test the browser’s URL bar to make sure the web site the place they’re coming into credentials is authentic. The usage of multi-factor authentication could be very useful in these instances as nicely.”
The way to defend your self from focused voicemail phishing
Multi-factor authentication additionally must be set for each service or web site that’s Web-facing. This manner, ought to an attacker handle to acquire a sound login and password, he nonetheless wouldn’t be capable to hook up with the service with correct MFA deployed. That is significantly essential for VPN entry and webmail companies, that are essentially the most focused Web-facing companies.
Methods and software program must also at all times be saved updated and patched, to stop from falling to widespread vulnerabilities utilized by attackers to get an preliminary foothold on focused firms.
Worker consciousness must also be raised on phishing and fraud. Customers additionally have to have a simple strategy to report suspicious emails to their IT division for evaluation.
Disclosure: I work for Development Micro, however the views expressed on this article are mine.