Hackers Pose As Cybersecurity Firms In Callback Phishing Attacks

July 13, 2022

Attackers are impersonating cybersecurity companies in callback phishing campaigns. As part of the new campaign, the attackers impersonate CrowdStrike to warn recipients that malicious network intruders have compromised their workstations.

The attackers also pointed out that a thorough security review was needed.

In the phishing email, employees are asked to call them using an enclosed phone number to plan the security check of their workstations.

As soon as an unsuspecting employee calls, the attacker directs the victim to install remote administration tools (RATs). The tools allow the threat actors to gain complete control of the workstation.

After the tool is installed, the threat actors will remotely install further tools that allow them to spread laterally through the network, steal corporate data and deploy ransomware that can encrypt devices.

“This is the first identified callback campaign impersonating cybersecurity entities and has higher potential success given the urgent nature of cyber breaches,” CrowdStrike warns.

The phishing campaign, unlike in the past, has the potential to be successful on a large scale, given that many employees work from home and away from their IT team.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

December 29, 2025 A critical security flaw has been found in LangChain, one of the most widely used frameworks for more...

December 23, 2025 Editor's Notes: This is the first of two articles reflecting on the year but Yogi Schulz. Schulz' more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn