Mass Email Floods Precede Fake Teams IT Support in New Wave of Breaches

Security researchers warn that email bombing, which triggers panic, is the entry point for fake IT support calls that achieve a 72 percent success rate.

CSBadmin
1 Min Read

The Initial Flood and the Fake Call

Attackers are initiating intrusions by sending thousands of spam emails to a single employee, a tactic known as email bombing. The deluge overwhelms the target, causing confusion and a sense of urgency. Immediately after, a contact impersonating internal IT support messages the victim through Microsoft Teams. These accounts, created with realistic names like michaelturner@ and professional display names such as Windows Security Help Desk, appear official. This combination of panic and a seemingly helpful colleague from a trusted platform creates a highly effective trap.

Gaining Access and Exfiltrating Data

Once the victim accepts help, the attacker asks them to install remote access tools like Quick Assist or AnyDesk. This grants full control of the computer. After gaining access, in several cases, attackers used legitimate software to steal data. They downloaded portable versions of WinSCP, a standard file transfer tool, to quietly move files off the compromised device. Another incident saw them deliver a malicious ZIP file named Email-Deployment-Process-System.zip through Quick Assist, which contained a Java binary to execute code and steal information. By using trusted tools and official-looking names, the threat actors bypass many standard security controls.

Source: Cybersecuritynews

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.