Voice Phishing Attacks Claimed by Notorious Cybercrime Group

0
13

Key Takeaways

  • The cybercrime group ShinyHunters is claiming credit for at least five attacks related to a voice phishing campaign targeting Google, Microsoft, and Okta environments.
  • The phishing kits used in the campaign are capable of intercepting user credentials and persuading targeted users to skip multifactor authentication.
  • Researchers at Sophos are tracking a cluster of about 150 domains created in December and used in voice phishing campaigns leading to data theft and extortion demands.
  • Google, Microsoft, and Okta have all been notified of the attacks, but the extent of the damage is still unclear.
  • The attacks highlight the evolving nature of social engineering techniques and the importance of raising awareness and supporting stronger defenses for customers.

Introduction to the Voice Phishing Campaign
The cybercrime group ShinyHunters is claiming credit for a series of attacks related to a voice phishing campaign that was previously disclosed by security researchers at Okta. The campaign, which targets Google, Microsoft, and Okta environments, uses custom phishing kits to intercept user credentials and persuade targeted users to skip multifactor authentication. This type of attack is particularly concerning, as it can allow hackers to gain access to sensitive information and systems without being detected. According to security researcher Alon Gal, ShinyHunters contacted him last week with claims that they had extorted at least three companies in connection with the voice phishing campaign.

The Extent of the Attacks
The initial contact was made after a story was posted on Bleeping Computer about the Okta disclosures, which stated that Okta single sign-on accounts were targeted in the attacks. Since then, the claim has been updated to include five companies, although the specific companies involved have not been confirmed. Researchers from Sophos are tracking a cluster of about 150 domains created in December and used in voice phishing campaigns leading to data theft and extortion demands. These domains are designed to impersonate authentication providers like Okta, and are targeted at specific companies. As Rafe Pilling, director of threat intelligence at Sophos’s Counter Threat Unit, explained, "We can’t confirm that they have all been used, but the threat actors are creating target-specific domains, themed to reflect single sign-on services and impersonating authentication providers like Okta."

Response from Affected Companies
Researchers at Google Threat Intelligence Group have confirmed that they are tracking the threat activity, although they were unable to share details. A post by one of the researchers initially referenced the activity, but was later deleted. A Google spokesperson stated that neither Google nor any of its products were affected by the social engineering campaign. Okta, on the other hand, has stated that its platform and services remain secure, but is calling attention to the evolving techniques used in the attacks to help raise awareness and support stronger defenses for customers. A representative for Microsoft said that the company had nothing to share at the moment, but would provide future updates if warranted.

The Importance of Awareness and Defense
The attacks highlight the evolving nature of social engineering techniques and the importance of raising awareness and supporting stronger defenses for customers. As Okta’s representative explained, "Okta Threat Intelligence routinely shares threat research to help companies protect against evolving social engineering techniques." By sharing information and best practices, companies can work together to stay ahead of these types of threats and protect their customers’ sensitive information. The fact that ShinyHunters is claiming credit for these attacks also highlights the need for companies to be proactive in their security measures, rather than simply reacting to threats as they arise.

Conclusion and Future Implications
In conclusion, the voice phishing campaign claimed by ShinyHunters is a serious threat to companies and individuals alike. The use of custom phishing kits and target-specific domains makes these attacks particularly difficult to detect and prevent. As the threat landscape continues to evolve, it is essential that companies prioritize awareness and defense, and work together to share information and best practices. By doing so, we can reduce the risk of these types of attacks and protect sensitive information from falling into the wrong hands. The future implications of these attacks are still unclear, but one thing is certain: companies must be proactive in their security measures to stay ahead of these evolving threats.

SignUpSignUp form

LEAVE A REPLY

Please enter your comment!
Please enter your name here