COVID-19 continues to force companies to deliver their services remotely. A growing threat perhaps unfamiliar to some readers is Vishing. Vishing is the hacking technique in which phone calls and voicemail messages pretending to be from reputable companies convinces individuals to give out personal information such as banking or credit card numbers, or other non-public personal information. This is similar to phishing and smishing but uses phone systems and voicemail instead of email.
The FBI and U.S. Cybersecurity Infrastructure Security Agency (CISA) recently announced a collaborative Cybersecurity Advisory Alert warning employers about the rise in voice phishing, or “vishing,” scams targeting remote workers. Until recently vishing targeted vulnerable populations such as elderly persons, however, the recent shift to remote work environments has emboldened and enabled cybercriminals to take advantage of weakened security protocols and an isolated workforce. In these attacks, targets receive a phone call seeking bank or credit card information for a “compromised” account, or calls from the “IRS” to verify an individual’s Social Security number, or targeted Medicare and Social Security scams.
Recently, vishing scams have evolved into coordinated and sophisticated campaigns aimed at obtaining a targeted company’s confidential, proprietary, and trade secrets. Hackers are accessing this coveted information through a company’s virtual private network (“VPN”) by exploiting a company’s own remote employees. VPNs are widely used in remote work environments to access corporate resources that remain onsite as opposed to in the cloud. While this traditional infrastructure and remote access over a VPN is typically locked down tightly, hackers have found devious ways to circumvent these traditional protections.
According to the FBI and CISA report, these vishing scams follow a common set of actions:
Hackers select a target company and begin exhaustively researching its workforce.
Next, hackers register a domain and create phishing webpages duplicating a company’s internal VPN login page.
This enables a hacker to quickly circumvent these strong protections and quickly enter a company’s VPN and potentially access its sensitive and confidential data.
Hackers contact employees on their personal cellphone posing as an IT technician or Help Desk Employee with a serious security concern. Pushback from the employee leads to the escalation of tone and importance at “protecting company resources from attackers!”
Hackers now have the employee’s entire suite of credentials.
Hackers use this temporary and limited-time VPN access to mine the company’s databases, records, and files to view and exfiltrate (steal) company information and enhance their ransomware threats by attacking your data’s confidentiality over and above its availability.
The company’s confidential information is up for grabs, leading to substantial ransom costs, forensic fees and costs, employee and customer reputation damage, and potentially significant liability for security breaches
It’s critical that businesses work with their staff to help them grow their cybersecurity knowledge so they are prepared for attacks like these. CyberHoot recommends you:
It’s best to stay ahead of the curve and be aware of the emerging cybersecurity threats to your business and what you should do to secure your business. Work with CyberHoot today to help your business become more aware and more secure through awareness training, policy governance, and phish testing.
Sources: BusinessWise, CBROnline, Lexology
Additional Reading: Vishing – CyberHoot Term
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.