It's better to call ahead before sending malware, Symantec finds
French-speaking organizations are receiving bogus calls asking them to check an invoice, which is actually malware
IDG News Service - Hackers are finding it pays to call ahead before sending malware-laden email.
Symantec has seen what it describes as a sophisticated social engineering campaign aimed at French-speaking accounting and finance department employees. The victim is called and asked in French if they can process an invoice sent by email.
The style of attack, known as "spear phishing," has been used against French organizations, including subsidiaries in Romania and Luxembourg.
"There is evidence to suggest that these attacks began as early as February 2013, however, it was only more recently in April that phone calls were being placed prior to sending the victim the phishing email," Symantec wrote on its blog.
The attackers obtain the victim's phone number and email -- both pieces of information that are generally easy to find. Their targets would have access to sensitive financial information, and handling invoices would be part of their normal course of business.
"Since handling invoices is something they would do on a regular basis, this lure has the potential to be quite convincing," Symantec wrote. "Each element of this attack requires careful planning and contributes to the overall success rate of the attack."
The email contains either a malicious link or an attachment, which is malware. Symantec said the attached program is a variant of "W32.Shadesrat," which is a remote access Trojan that hackers use to steal information from a computer.
Shadesrat can steal passwords and conduct distributed denial-of-service attacks, according to a writeup from Symantec from 2011.
Shadesrat can be licensed for US$40 to $100 a year, Symantec said.
The company said the attackers may have just limited information on their targets and recommended those receiving a call ask additional questions to verify the caller is legitimate. Sensitive information should also be encrypted.
"Organizations also need to be aware that personally identifiable employee information that exists outside of your enterprise, even in the form of an invoice, can be used against you if a business associate becomes compromised," Symantec wrote.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts