Attack Techniques: Blended Attacks via Phone

Last month, we looked at a technique where a phisher serves his attack from the user’s own computer so that anti-phishing code like SmartScreen and SafeBrowsing do not have a meaningful URL to block. Another approach for conducting an attack like this is to send a lure which demands that the victim complete the attackContinue reading “Attack Techniques: Blended Attacks via Phone”


This content originally appeared on text/plain and was authored by ericlaw

Last month, we looked at a technique where a phisher serves his attack from the user’s own computer so that anti-phishing code like SmartScreen and SafeBrowsing do not have a meaningful URL to block.

Another approach for conducting an attack like this is to send a lure which demands that the victim complete the attack out-of-band using a telephone. Because the data theft is not conducted over the web, URL reputation systems don’t have anything to block.

Here’s an example of such a scam, which falsely claims that the user was charged $400 for one of the free programs already on their PC:

The attacker hopes that the user, upon seeing this charge, will call the phone number within the email and get tricked into supplying sensitive information. This particular scam’s phone number is routed to a call center purporting to be “Microsoft Support.”

Evidence suggests that some email services have gotten wise to this scam: because the phone number needs only be read by a human, attackers may try to evade detection and blocking by encoding their phone numbers using non-digit characters or irregular formatting, as in this lure:

Unfortunately, relatively few phones offer any mechanism for warning the user when they’re calling a known-scam number — Google’s “Scam Likely” warnings only seem to show on the Pixel for inbound calls. As with traditional phishing attacks, bad actors can usually switch their infrastructure easily after they are blocked.

Stay safe out there!


This content originally appeared on text/plain and was authored by ericlaw


Print Share Comment Cite Upload Translate Updates
APA

ericlaw | Sciencx (2023-02-09T14:25:00+00:00) Attack Techniques: Blended Attacks via Phone. Retrieved from https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/

MLA
" » Attack Techniques: Blended Attacks via Phone." ericlaw | Sciencx - Thursday February 9, 2023, https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/
HARVARD
ericlaw | Sciencx Thursday February 9, 2023 » Attack Techniques: Blended Attacks via Phone., viewed ,<https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/>
VANCOUVER
ericlaw | Sciencx - » Attack Techniques: Blended Attacks via Phone. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/
CHICAGO
" » Attack Techniques: Blended Attacks via Phone." ericlaw | Sciencx - Accessed . https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/
IEEE
" » Attack Techniques: Blended Attacks via Phone." ericlaw | Sciencx [Online]. Available: https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/. [Accessed: ]
rf:citation
» Attack Techniques: Blended Attacks via Phone | ericlaw | Sciencx | https://www.scien.cx/2023/02/09/attack-techniques-blended-attacks-via-phone/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.