Check Point security researchers have spotted a new type of social engineering attack to deceive those who work from home. The goal is personal information, money and the introduction of malware into a corporate network.
During the pandemic, many people work from home. This offers cyber criminals the opportunity to attack their employees as well as their employers.
What is Vishing?
Vishing is a variant of "fishing", where the voice - V for the English term "voice" - plays a very important role. Scammers call employees and impersonate a specific employee to gain access to certain parts of the network, information or skills, such as the company's money transfer functions.
The attacks discovered by Check Point are highly sophisticated:
Hackers use LinkedIn to find out which employee has access to it through information stored and represented by a large company. In addition, security investigators have found that criminals in English-speaking countries recruit fraudsters who speak very good English to read a text when making their phone call.
In addition, fraudsters are constantly changing phone numbers to call their targets, to prevent them from being located and blacklisted. Vishing attacks claim that a company executive is calling. The calls often claim that the executive comes from the financial, legal or human resources department.
Different methods of attacking with graphics:
Employees at home are very popular targets, because teleworkers are alone at home and of course can not easily check if the person talking to them on the phone is the one who claims.
CISA also warned in August 2020
Check Point observations on the new attack confirm the "fishing" warnings that issued in August (PDF) by the Cyber Security and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI). Both drew attention to targeted attacks against US companies and also stressed that teleworkers would be the main target of the calls.
Vishing: A new danger for teleworkers
Commenting on the new attacks, Lotem Finkelsteen, Director of Threat Intelligence at Check Point Software Technologies, said:
"Fishing is one of the most dangerous threats facing teleworkers today and fraud is rarely detected. We have seen a growing number of multi-layered cyber attacks using vishing. First, vishing helps hackers learn more about their targets before the main attack. On the other hand, it deepens the most famous phishing. Vishing is also becoming the nucleus of major attacks, where victims are tricked into revealing 2FA codes via SMS or accessing specific systems - as happened in the big Twitter hack earlier this year.
Although all of them refer to the US and people who use LinkedIn to reveal too much personal information about themselves, their workplace and their employer, it is likely that the attacks will take place in other parts of the world.