Cyber Attack Method is Bypassing your Filters

by | Cybersecurity

Have you heard of callback phishing? Typically a phishing email contains some sort of message requiring the user’s urgent response. But unlike traditional email phishing, it does not contain a URL linked to a malicious site or content. Instead, it contains a phone number that the user is prompted to call. It has raised the attention of the FBI who issued an alert about this cyber attack method bypassing your filters.

Callback phishing is gaining popularity among cybercriminals because it poses a unique challenge to anti-phishing content filters. With traditional phishing attacks, the anti-phishing content filters can review the sent text and open the URL locations to see if they contain malicious content or code. There are content and objects that can be examined to determine whether or not the email is malicious. Unlike traditional phishing emails, callback phishing messages are presented as a single un-clickable picture file, making it difficult for filters to analyze the content.

When users make the call, they are typically directed to an overseas call center. The scammers behind callback phishing are adept at manipulating victims into installing malicious software or providing data. In some cases, this software could be ransomware, while in generic callback scams, scammers may manipulate users into performing transactions, ultimately stealing money from the victim.

The security awareness of everyone is key to stopping this attack method.

  1. Educate Your End Users: Start by raising awareness among your employees about callback phishing. Train them to be suspicious of emails that contain only a single picture file, a repeated phone number, and no clickable links.
  2. Encourage Vigilance: Teach your employees to be wary of unexpected messages that instruct them to perform actions they’ve never been asked to do before. If a message fits this description, advise them to confirm using alternative methods before taking any action.
  3. Verification Protocols: Implement verification procedures for any unexpected or suspicious messages. Encourage users to verify the legitimacy of such messages by calling the company directly using a known good phone number or visiting the official website directly.

Education is a powerful weapon, and by empowering your employees with knowledge about callback phishing, you strengthen your business’s defenses. If you need help implementing a security awareness training program, reach out to us.

Protect Your Business During The Holidays

Protect Your Business During The Holidays

The holiday season is full of cheer—but for cybercriminals, it's also a time of opportunity. With businesses closing for extended periods and employees distracted by festivities, it's prime time for hackers to strike. Whether your company is shutting down for the...

read more
How to Qualify for Cyber Insurance

How to Qualify for Cyber Insurance

Cyber insurance is a safety net that can save you from financial ruin in the aftermath of a cyberattack. But here’s the catch: insurance providers aren’t handing out policies without expecting you to meet certain cybersecurity requirements first. Here are the main...

read more

Let's chat about how we can help.

Call us at 636.949.8850, grab a spot on our calendar, or fill out this form and we will reach out to you.

  • This field is for validation purposes and should be left unchanged.