Begin typing your search above and press return to search.
proflie-avatar
Login
exit_to_app
DEEP READ
Schools breeding hatred
access_time 14 Sep 2023 10:37 AM GMT
Ukraine
access_time 16 Aug 2023 5:46 AM GMT
Ramadan: Its essence and lessons
access_time 13 March 2024 9:24 AM GMT
exit_to_app
Homechevron_rightTechnologychevron_rightSpear phishing: cyber...

Spear phishing: cyber fraudsters impersonate as CEO of IT firms: Report

text_fields
bookmark_border
Spear phishing: cyber fraudsters impersonate as CEO of IT firms: Report
cancel

New Delhi: In the domain of spear phishing campaigns, a new one has been detected by cybersecurity researchers. On Monday researchers said they have discovered one targeting multiple IT firms where scammers were sending WhatsApp messages to top tier employees' personal numbers pretending to be - none other than - their CEO.

CloudSEK analysts found a spear phishing campaign targeting multiple firms in which a specific form of a message pretending to come from superiors or CEOs may actually be a fraud.

In the messages, the threat actor pretends to be the company's CEO and sends a WhatsApp message to employees (mostly top-level executives) on their personal phone numbers.

Scammers misuse CEOs' publicly available pictures by using WhatsApp profile pictures as a social engineering tactic to convince the victim.

"The research unveiled lead generation and business information tools being misused by these scammers to extract personal phone numbers," said a CloudSEK researcher.

The scam begins when employee receives an SMS-based message from an unknown number allegedly impersonating a top-ranking executive from the organisation.

The reason for impersonating the top-ranking executive is to instill urgency and panic.

If the receiver of the SMS acknowledges the scammer with a response, the threat actor/scammer would request to complete a quick task. The quick tasks commonly include purchasing gift cards for a client or employee and/or wiring funds to another business.

"In some cases, the scammer may ask employees to send personal information (like PINs and passwords) to third parties, often providing a plausible reason to carry out the request," said the report.

Threat actors often use commanding and persuasive language to convince the email victim to respond.

Senior employees of the organisation can be looked up from LinkedIn.

Threat actors then use popular sales intelligence or lead generation tools such as Signalhire, Zoominfo, Rocket Reach to gather personal identifiable information (PII) like emails, phone numbers, and more.

"These online databases of businesses have their methodologies for obtaining, verifying, and then selling the employees' contact details of an entity," said the report.

(Based on IANS feed)

Show Full Article
TAGS:Cyber fraudstersSpear phishingimpersonating as CEOsWhatsApp messagesCloudSEK
Next Story