• Login
Whats Current In
No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development
No Result
View All Result
Whats Current In
No Result
View All Result
Home Cyber Security

How to Prevent Callback Phishing Attacks on Your Organization

Sponsored by Specops Software by Sponsored by Specops Software
March 1, 2023
Reading Time: 4 mins read
0
How to Prevent Callback Phishing Attacks on Your Organization

Hacker looking at mobile device

RELATED POSTS

Clop ransomware claims responsibility for MOVEit extortion attacks

Microsoft’s Outlook.com is down again on mobile, web

New tool scans iPhones for ‘Triangulation’ malware infection

Hybrid phishing attacks continue to pose a clear and present danger to all organizations. How can these threats be mitigated to reduce their impact? A combination of targeted security tools and a strong cybersecurity culture are the dual approach organizations can use to protect their network from an attack.

According to the cyber intelligence report from Agari, hybrid phishing attacks have increased by 625%. One of the most damaging is callback phishing – also often known as a TOAD (Telephone-Orientated Attack delivery).

First appearing in the wild in March 2021 as BazarCall, the attacks were mounted to install ransomware on corporate networks.

These attacks use two vectors, usually beginning with an email and later followed up by one or more voice calls. First, the threat actor sends what appears to be a legitimate invoice of high value for a service. Next, the recipient is asked to call a number to investigate the charge being made.

Example of Callback phishing email attachment
Example of Callback phishing email attachment

At this point, the attacker will use more social engineering tactics to gain network access information or install remote access software.

Used as bait, the initial email is often linked to older subscriptions that the recipient may know of but had thought they had cancelled. Connecting these messages to live verification voice calls makes callback phishing so dangerous. The attackers have a direct connection to their intended target, often using bogus calls from technical support that convince their victims to install a ClickOnce executable named ‘support.Client.exe.’

Buy JNews
ADVERTISEMENT

As organizations look toward their post-pandemic future, securing networks, and remote workers who now form a significant percentage of their workforce, is imperative.

What is clear, and as ProofPoint illustrates in their report, is that developing a strong culture of cybersecurity is the most effective defence against personalized attacks, such as callback phishing.

The future of cyberattacks will see phishing attacks proliferate. In addition, hybrid attacks are becoming more common as they use several approaches that are often more successful than single attack vectors.

Security culture

It has often been said that end-users are the weakest link in an organization’s security. Low levels of cybersecurity awareness can be the root cause of successful cyberattacks, especially attacks such as Callback phishing.

Organizations must have a strong culture of security and a first step to strengthening cybersecurity awareness, is setting up training programs specifically for phishing messages that invoke fear or a sense of urgency, unexpected invoices, and requests to establish a phone call or install software.

Additionally, expanding investments in tools designed to detect and prevent anomalous activity, such as installing unrecognised software or exfiltrating sensitive data.

Businesses should, of course, have robust and comprehensive security systems to protect against phishing attacks. Services such as Mimecast and the range of Microsoft Defender options available enable enterprises to raise their cyber threat protection.

Practicing Zero Trust

Taking a Zero Trust approach to cybersecurity has been expanding. This is vital to appreciate as cybersecurity has become as perimeter-less as remote working.

Focusing on data, hosted services, and identities becomes paramount in a Zero Trust environment. Identities are a key emphasis here. Callback phishing is not an attack on the physical network infrastructure, but the end-users accessing these resources – often remotely.

Callback phishing attacks can also be used against service desks. Almost half of organizations do not have secure user verification in place for calls to the service desk, opening up vulnerabilities for targeted attacks.

The Specops Secure Service Desk is a practical example of how a Zero Trust security environment can be effectively managed. Specops Secure Service Desk increases security by enforcing strong authentication methods to verify callers, minimizing the risk for user impersonation.

Specops Secure Service Desk
Specops Secure Service Desk

Service desks must have robust and comprehensive security with access to password resets, user verification, and account unlocking. Desk operators must also have high levels of cybersecurity awareness and make conscious decisions that protects the network and user access.

The working environment has changed out of all recognition – something cybercriminals are all too aware of. Therefore, protecting critical systems from cyberattacks requires a multifaceted approach to security.

Taking a Zero Trust stance is a robust approach, but with attacks such as callback phishing using several channels of attack, protection must also be multi-functional. And never forget that often, with these attacks, a strong and resilient security culture will always be the most effective frontline of defence.

Sponsored and written by Specops Software

Share54Tweet34Pin12
Sponsored by Specops Software

Sponsored by Specops Software

Related Posts

Hackers exploit Control Web Panel flaw to open reverse shells
Cyber Security

Clop ransomware claims responsibility for MOVEit extortion attacks

June 5, 2023
Outlook for Mac now free, Microsoft 365 subscription not needed
Cyber Security

Microsoft’s Outlook.com is down again on mobile, web

June 5, 2023
New tool scans iPhones for ‘Triangulation’ malware infection
Cyber Security

New tool scans iPhones for ‘Triangulation’ malware infection

June 5, 2023
New AhRat Android malware hidden in app with 50,000 installs
Cyber Security

SpinOk Android malware found in more apps with 30 million installs

June 5, 2023
GIGABYTE releases new firmware to fix recently disclosed security flaws
Cyber Security

GIGABYTE releases new firmware to fix recently disclosed security flaws

June 5, 2023
Researchers secretly helped decrypt Zeppelin ransomware for 2 years
Cyber Security

KeePass v2.54 fixes bug that leaked cleartext master password

June 5, 2023

Recommended Stories

Gemini receives $100 million from Winklevoss twins: Bloomberg report

Gemini receives $100 million from Winklevoss twins: Bloomberg report

April 11, 2023
Are BTC miners back on their feet? This data suggests…

Are BTC miners back on their feet? This data suggests…

May 26, 2023
MSI accidentally breaks Secure Boot for hundreds of motherboards

MSI confirms security breach following ransomware attack claims

April 7, 2023

Popular Stories

  • New Python malware backdoors VMware ESXi servers for remote access

    Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide

    137 shares
    Share 55 Tweet 34
  • Exploit released for actively abused ProxyNotShell Exchange bug

    137 shares
    Share 55 Tweet 34
  • Facts and myths about the warriors who raided Europe and explored the New World

    137 shares
    Share 55 Tweet 34
  • RedEyes hackers use new malware to steal data from Windows, phones

    136 shares
    Share 54 Tweet 34
  • New Windows Server updates cause domain controller freezes, restarts

    136 shares
    Share 54 Tweet 34
Whats Current In

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Visit our landing page to see all features & demos.

LEARN MORE »

Recent Posts

  • Uniswap: What’s next as UNI’s plunge hits range low
  • Polygon zkEVM’s growth unhindered: What it means for MATIC
  • Polkadot announces new proposal; will DOT see a change of fate

Categories

  • Apple Computer
  • Blockchain
  • Cyber Security
  • Tech News
  • Venture Capital

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Blockchain
  • Cyber Security
  • Gadgets & Hardware
  • Startups
    • Angel investing
    • Venture Capital
  • More Tech News
    • AI
    • App Development
    • Cloud & SaaS
    • Gaming
    • Web Development

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?