Aside from the SolarWinds breach in 2020, Russian hackers have also been found to piggyback on cloud service resellers’ access to their customers’ IT systems to disrupt the global technology supply chain and “more easily impersonate an organization's trusted technology partner to gain access to their downstream customers,” said Microsoft.
The tech giant has also been publishing research regarding Russian threat actors and their attacks on Ukrainian companies, non-profits, and government organizations.
In one of these latest email phishing scams, WhatsApp is brought into the limelight with a new voicemail phishing attack vector.
Researchers have discovered that Russian hackers are, this time, using WhatsApp for a voicemail phishing attack that targets about 28,000 companies and organizations from various industries, particularly, healthcare and retail.
Only, they’re not using the app itself; they’ve spoofed the voicemail to look like it came from WhatsApp.
This sophisticated voicemail phishing campaign is, in reality, four cyberattack types in one:
Researchers further reveal that the email “passed all SPF and DMARC authentication checks,” stating the possibility that the hackers had utilized an older or unused variety of the parent domain to pull off the voicemail phishing campaign.
Other forms of WhatsApp phishing tactics that have recently emerged include:
Erich Kron, security awareness advocate at KnowBe4, weighed in on the severity of these latest email phishing scams:
"By using a known and trusted service such as WhatsApp, and by using an email server that passes SPF/DKIM checks, the attackers behind this phishing email are reducing the chance of the message being tagged by spam filters, while improving the chance that the user will engage with the phish.”
This technique, Kron expounds, allows the message to blend in with (or at least not stand out as much from) the normal email traffic that users receive. Kron adds:
“This type of attack highlights the skill and craftiness of modern attackers who are using phishing emails as their weapon.”
Delving deeper into the topic, we find ourselves asking: If they could do this with WhatsApp, are any other brands and safe?
Potentially, hackers could develop different variations of this attack with any email and mobile chat applications like WhatsApp. And it’s not just Russian threat actors; any competent cybercriminal can spoof business communication companies like Slack, Teams, or Telegram and lure in unsuspecting victims.
Even service providers like Salesforce are not safe, with news of hackers spoofing Salesforce emails to steal credentials, personal information, and credit card numbers.
So what should companies do?
First, train employees to recognize these voicemail phishing attacks and social engineering attempts and teach them how to respond/report these threats.
In addition to training employees to recognize the latest email phishing scams, organizations also need to secure their email and chat applications. A cybersecurity solution that leverages machine learning to reduce regulatory and legal risks with consistent policy application and governance for communications is a great help.
Next, security teams need enhanced visibility, so that they may discover and onboard all authorized accounts for protection. Enhanced visibility also enables teams to track new connection requests, inspect messaging for malicious content, and archive all account activity.
Most importantly, find solutions that use natural language understanding and machine learning on social media, mobile chat, collaboration, and email so messages to increase visibility across communication channels to understand context and intent of social engineering attacks.
Learn more about protecting your business from voicemail phishing and other social engineering attacks through this article.
If you are interested in learning more about the SafeGuard Cyber solution, you can take a quick 5-minute tour.