City
Epaper

CEO impersonation fraud threatening IT firms: Report

By IANS | Published: February 06, 2023 10:36 AM

New Delhi, Feb 6 Cyber-security researchers on Monday said they have discovered a spear phishing campaign targeting multiple ...

Open in App

New Delhi, Feb 6 Cyber-security researchers on Monday said they have discovered a spear phishing campaign targeting multiple IT firms where scammers were sending WhatsApp messages to top tier employees' personal numbers pretending to be their CEO.

CloudSEK analysts found a spear phishing campaign targeting multiple corporations wherein a specific form of a message purportedly coming from superiors or CEOs may actually be a fraud.

In these messages, the threat actor pretends to be the company's CEO and sends a WhatsApp message to employees (mostly top-level executives) on their personal phone numbers.

Scammers misuse CEOs' publicly available pictures by using WhatsApp profile pictures as a social engineering tactic to convince the victim.

"The research unveiled lead generation and business information tools being misused by these scammers to extract personal phone numbers," said a CloudSEK researcher.

The scam begins with employees receiving an SMS-based message from an unknown number allegedly impersonating a top-ranking executive from the organisation.

The reason for impersonating the top-ranking executive is to instill urgency and panic.

If the receiver of the SMS acknowledges the scammer with a response, the threat actor/scammer would request to complete a quick task. The quick tasks commonly include purchasing gift cards for a client or employee and/or wiring funds to another business.

"In some cases, the scammer may ask employees to send personal information (like PINs and passwords) to third parties, often providing a plausible reason to carry out the request," said the report.

Threat actors often use commanding and persuasive language to convince the email victim to respond.

Senior employees of the organisation can be looked up from LinkedIn.

Threat actors then use popular sales intelligence or lead generation tools such as Signalhire, Zoominfo, Rocket Reach to gather personal identifiable information (PII) like emails, phone numbers, and more.

"These online databases of businesses have their methodologies for obtaining, verifying, and then selling the employees' contact details of an entity," said the report.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Tags: SignalhireLinkedinLin linLe corporationLinkedin post
Open in App

Related Stories

TechnologyWomen Hiring for Leadership Roles in India Rises to 23.2% in Early 2024: LinkedIn Report

NationalSurvey Reveals 88% of Indian Employees Considering For A Job Change in 2024

TechnologyMicrosoft launches new AI Skills initiative to help people learn AI

InternationalLinkedIn introduces AI Copy Suggestion feature for ad creatives

Technology9 in 10 B2B marketing leaders in India to boost use of generative AI: Report

Technology Realted Stories

TechnologyUS sues Adobe for hiding fees, preventing consumers from cancelling subscriptions

TechnologyHyundai Motor's envisioned US plant to prioritise EVs: CEO

TechnologyChronic high BP during pregnancy doubled between 2008 and 2021 in US: Study

TechnologyEating samosa, burger when stressed out can fuel anxiety: Study

TechnologyScientists spot 6 distinct biological types of depression