CybersecurityIT Helpdesk Scams: The Easy Target for Cybercriminals

IT Helpdesk Scams: The Easy Target for Cybercriminals

Key Takeaways:

  • Custom voice-phishing kits are being sold on dark web forums and messaging platforms, making it easier for criminals to commit social engineering scams and identity fraud.
  • These kits include real-time assistance to help attackers intercept users’ credentials and multi-factor authentication codes.
  • The kits can mimic the authentication flows of identity providers and other identity systems used by organizations.
  • Attackers can use these kits to bypass push notifications and other forms of multi-factor authentication.
  • The attacks often involve a combination of social engineering and targeted ransomware, with a financial motive.

Introduction to Voice-Phishing Kits
Criminals are now using custom voice-phishing kits to commit social engineering scams and identity fraud, thanks to the availability of these kits on dark web forums and messaging platforms. These kits are being sold as a service to a growing number of digital intruders, who are targeting victims’ Google, Microsoft, and Okta accounts. The kits include real-time assistance to help attackers intercept users’ credentials and multi-factor authentication codes. According to Okta Threat Intelligence VP Brett Winterford, there are at least two kits that implement this novel functionality, which allows attackers to monitor the phishing page as the targeted user is interacting with it and trigger different custom pages that the target sees.

How the Phishing Kits Work
The phishing kits have been developed to closely mimic the authentication flows of identity providers and other identity systems used by organizations. This creates a more compelling pretext for asking the user to share credentials and accept multi-factor authentication challenges. The kits allow the attacker to monitor the phishing page as the targeted user is interacting with it and trigger different custom pages that the target sees. This type of malicious activity has evolved significantly since late 2025, with some ads for these phishing kits also looking to recruit native English-speaking callers for the scams. These callers pretend to be from an organization’s helpdesk and approach targets using the pretext of resolving a support ticket or performing a mandatory technical update.

The Attack Process
The attack process involves several steps. First, the attacker performs reconnaissance on their targets, learning users’ names, what apps they use, and phone numbers for IT support calls. These details can be found fairly easily on companies’ websites, employees’ LinkedIn pages, and other publicly available sources. The attacker then uses the phishing kit to create a realistic-looking login website, calls the victim using a spoofed support hotline or company phone number, and pretends to be from the company’s help desk to convince the victim to visit the phishing page. The attacks vary from there, depending on the attacker’s motivation and their interactions with the user. If all goes according to plan, the victim enters their username and password into the phishing site, and it’s automatically forwarded to the attacker’s Telegram channel, and the attacker now has valid credentials for the legitimate sign-in page.

Real-Time Assistance and Multi-Factor Authentication
Here’s where real-time assistance comes into play: While the victim is still on the phone, the attacker uses the compromised credentials and attempts to log in to the victim’s account, noting whatever MFA challenges are used and updating the phishing site in real-time. The attacker then asks the victim to enter a one-time password, accept a push notification, or complete a different type of multi-factor authentication (MFA) challenge. The fake page that the victim sees supports this request, thus making the social-engineering scam even more believable. If presented a push notification, for example, an attacker can verbally tell the user to expect a push notification, and select an option from their command-and-control panel that directs their target’s browser to a new page that displays a message implying that a push message has been sent, lending plausibility to what would ordinarily be a suspicious request for the user to accept a challenge the user didn’t initiate.

Impersonation-as-a-Service
Okta’s research echoes earlier reporting about "impersonation-as-a-service," in which criminals package and sell tools for social engineering and identity fraud using a software-as-a-service-style business model. As a bad actor, you can subscribe to get tools, training, coaching, scripts, exploits, everything in a box to go out and conduct your infiltration operation that often combines these social engineering attacks with targeted ransomware, almost always with a financial motive. This type of attack is becoming increasingly common, and organizations need to be aware of the risks and take steps to protect themselves and their users. By understanding how these attacks work and taking proactive measures to prevent them, organizations can reduce the risk of falling victim to these types of scams.

- Advertisement -spot_img

More From UrbanEdge

US-Iran Conflict Live Updates: Trump Demands Iran Stand Down; US Consulate Stormed

Breaking: U.S. service members killed after Iran's retaliatory strikes on bases. Trump demands Iran's complete stand down. Global tensions rise as China's condemnation and protests unfold. Israeli military plans more strikes; Iran's retaliation intensifies. The next 48 hours could define a regional conflict...

F1 Aus GP Changes: Middle East Conflict Cancels Key Event

The Middle East conflict has led to the cancellation of Pirelli's tyre test in Bahrain, impacting F1 Australian GP logistics. Iranian strikes closed airports, forcing teams to reroute flights. While Melbourne remains on schedule, concerns loom over the upcoming Bahrain and Saudi Arabian Grands Prix...

Oracle Red Bull Racing Partnership: Multi-Year Deal Powers Data-Driven Performance

Oracle and Red Bull Racing extend their groundbreaking partnership, integrating Oracle's advanced AI and cloud technologies into all aspects of race operations. This deal empowers Red Bull Ford Powertrains to excel under the impending F1 regulation shifts and debut revolutionary AI strategy agents trackside in 2025...

Microsoft Bug Hides Mouse Pointer in Classic Outlook Fix

Microsoft has confirmed a bug in classic Outlook that causes the mouse pointer to disappear, affecting usability. The issue also impacts OneNote and other 365 apps. Microsoft is working on a fix, but in the meantime, users can try temporary workarounds involving PowerPoint to navigate blindly...

Fake Job Recruiters’ Malware in Developer Coding Challenges

Cybercriminals are exploiting developer job hunts by embedding malware in coding challenges. These attacks are effective as they leverage routine aspects of the developer workflow. Fake recruiters promise unrealistic salaries while embedding malicious code, making vigilance crucial for job-seekers in the tech industry...

Business Data, Emails & Browsing History Theft by Malicious Chrome Extensions

Cybercriminals exploit Chrome extensions to access confidential business data, emails, and browsing history from millions of users. These malicious tools often disguise themselves as legitimate productivity extensions, putting unsuspecting users at risk. Discover how to identify threats and protect your sensitive information from stealthy cyber intrusions...

Valentine’s Day Cyber Threats & Risks: Protect Yourself

Valentine's Day creates a perfect storm for cybercriminals, with romance scams accounting for $697 million in losses and phishing attempts spiking by 28%. Protect yourself by employing security measures like two-factor authentication and understanding swift actions post-scam to minimize risk and financial damage...

PlayStation 2026 State of Play Games Reveals & Announcements

PlayStation's 2026 State of Play unveiled over 15 new titles, including a surprise God of War spin-off and a remake of the original trilogy. Fans thrilled over the John Wick game reveal featuring Keanu Reeves, with new IPs and third-party revivals like Castlevania also showcased...

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...
- Advertisement -spot_img