BazarCall updates social engineering tactics for deploying malware

October 12, 2022

The operators of the BazarCall call back phishing attacks are upgrading the social engineering tactics used to deploy malware in victim networks. According to cybersecurity firm Trelix, the program serves as an entry point for financial fraud. Simply put, BazarCall delivers the next level of payloads such as ransomware.

BazarCall is known to spread BazarBackdoor alias BazarLoader by manipulating potential victims to call a phone number specified in decoy email messages.

The decoy email messages inform users of the renewal of a trial subscription, such as an antivirus service, and urge them to contact their support desk to cancel the plan or risk being automatically charged for the premium version of the software.

The aim of the attack is to allow remote access to the endpoint that pretends to terminate the supposed subscription or install a security solution to rid the machine of malware.

Various strategies ask the victim to launch a special URL specifically designed to download and run a malicious executable file that stores the legitimate ScreenConnect remote desktop software.

After persistence access has been achieved, the attacker opens fake cancellation forms asking victims to fill in personal details and log into their bank accounts to complete the refund. This strategy is used to deceive victims into sending the money to the scammer.

The sources for this piece include an article in TheHackerNews.

Top Stories

Related Articles

April 17, 2026 Booking.com has confirmed a data breach exposing customer booking details and contact information, prompting warnings about a more...

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn