Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Phishing is a Threat, Even By Phone

Phishing is a Threat, Even By Phone

Telework has become crucial for businesses to sustain themselves right now, as remote work became a hard and fast requirement in the face of the coronavirus. However, if businesses aren’t careful, they could trade one issue for another in exposing themselves to security threats.

Let’s take a few moments to discuss one threat that many are facing: voice-based phishing, or vishing.

Federal Agencies Have Sounded the Alarm

Both the Federal Bureau of Investigation and the Cybersecurity and Infrastructure Security Agency have called attention to this variety of phishing. By calling a targeted victim, rather than sending an email or another kind of correspondence, an attacker can potentially pull the wool over their target’s eyes by using a less-expected attack strategy.

Those who are working from home are being targeted by a vishing campaign intended to acquire the access credentials needed to get into corporate networks. Once these credentials are obtained, the cybercriminals responsible can turn around and sell this access to others for their nefarious use.

How These Attacks Are Presenting Themselves

By registering lookalike domains to pose as a company’s actual resources, cybercriminals set themselves up to steal company credentials. These domains can be extremely convincing, often structured in the following ways:

  • support-[company]
  • ticket [company]
  • employee-[company]
  • [company]-support

As these pages replicate a company’s login page to their virtual private network, unwitting users are more likely to enter their credentials. This means that the attacker is then able to capture these credentials—including multi-factor authentication codes—and use them to gain access to the targeted business’ network.

Once these facsimile pages are completed, criminals then do some digging into a company to learn more about their employees. A profile is constructed, with the name, address, phone number, job title, and even length of employment for each employee included. Using this data, a hacker can call their target through a spoofed number and send them to their fraudulent VPN webpage.

This gives the hacker the means to access an employee’s work account, enabling them to collect more data for further phishing efforts or other data theft efforts. These attacks are now being directed to the team members that are currently working from home, making it even more important for your employees to be able to recognize the signs of phishing.

How to Identify Phishing Scams of All Kinds

  • Exercise caution when dealing with unsolicited calls, voicemails, and any other messages from those you don’t know. If you can, double-check that the person is who they claim to be through another means of communication.
  • Double-check the number of a suspected vishing caller, as well as any Internet domains you may be told to navigate to.
  • Avoid visiting any websites that a caller recommends without good reason to trust their legitimacy.

FRS Pros is here to help you with an assortment of your business’ IT needs and concerns, including your cybersecurity. Give us a call at 561-795-2000 to learn about the services and solutions we can put in place on your behalf.

What Would Happen if All Data Was Publically Avail...
Tip of the Week: When Do I Need to Clean My Comput...

By accepting you will be accessing a service provided by a third-party external to https://frspros.com/

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet User Tips Google Software Cloud Innovation Hardware Efficiency Microsoft Data Hosted Solutions Email Business Management Computer Communication Windows 10 Malware Tech Term Cybersecurity Smartphones Workplace Tips IT Support Data Backup Android Mobile Devices Small Business IT Services Business Disaster Recovery Smartphone Backup Browser Outsourced IT Office 365 Data Recovery Collaboration Upgrade VoIP Gadgets Users Internet of Things Windows Communications Information Phishing Cloud Computing Apps Miscellaneous Ransomware Cybercrime Business Continuity Data Security Network Passwords Managed IT Services Automation Saving Money Covid-19 Operating System Social Media Facebook Quick Tips Microsoft Office Wireless Mobile Device Management Managed Service Law Enforcement Employer-Employee Relationship Health Blockchain Vulnerability Two-factor Authentication Money Artificial Intelligence OneNote Server Alert Networking Conferencing Best Practice Managed IT Applications Spam Holiday Chrome Virtualization Mobile Device Managed IT Services Mobile Office IT Support Information Technology Telephone Systems Managed Service Provider Windows 7 Tech Support Word Project Management Patch Management Password Unsupported Software Augmented Reality BYOD Router Bandwidth App Data Breach Hacking Google Drive Settings Gmail Windows 10 Save Money Access Control Computers Printing Data Storage Bring Your Own Device Wi-Fi WiFi Retail Audit Cortana Voice over Internet Protocol Robot Productivity Meetings BDR Data Protection Data Loss Sports The Internet of Things Remote Workers Business Technology VPN iPhone Google Docs Software as a Service Cost Management Wireless Charging Telephony IT Management History Hard Drive Display Application Marketing Devices WannaCry Encryption Commerce Human Resources Safety Payment Cards Hosted Solution Battery Avoiding Downtime Mobility Travel Search Proactive IT File Sharing SaaS Excel Management Risk Management Apple Fraud Paperless Office Mobile Security Touchscreen Vendor Budget Evernote Going Green Social Wireless Technology Update Government Google Assistant User Error Data Management Politics HIPAA Shortcut Remote Hybrid Cloud Vendor Management Identities Humor Hosted Desktop Employee-Employer Relationship Streaming Media Unified Threat Management Processor Regulations Compliance Wireless Internet Saving Time Lithium-ion battery Fiber Optics Medical IT Charger Development Telework Value Wasting Time Solid State Drive Scam Ciminal Amazon Downtime Root Cause Analysis Data Theft Personal Information Server Maintenance Remote Work Data Privacy Access Education Emails Cast Device Security Innovations Computer Fan Samsung Legislation Language Smart Devices Chromecast Upgrades Adobe Workers Benchmarks Policy Gamification Keyboard Shortcuts Holidays 5G Reputation Micrsosoft Audits Accessory Hard Disk Drive Virtual Assistant E-Commerce Legal Gifts Computing Investment Net Neutrality Internet Exlporer Windows Ink Data storage Managed IT Service Remote Working Antivirus Comparison Sabotage Troubleshooting Testing Licensing Updates Remote Computing Myths Procedure Memory Microsoft Excel IT budget Copiers YouTube Outlook Business Intelligence Solutions Computer Forensics Peripheral Uninterrupted Power Supply IT Solutions Alexa for Business Credit Cards App store ROI Internet Service Provider Chromebook Co-Managed Services Webinar Google Maps Spyware Managed Services Provider Training Specifications Virus PC CRM Camera Instant Messaging Consultant Hacker Microsoft Word Threats Video Conferencing Financial Payroll Laptop Inventory Employees Emergency Remote Monitoring Transportation Digital Signage Printer Facebook Privacy Employee Files Private Cloud Windows Server 2008 R2 Telephone DDoS Point of Sale IT solutions Disaster Entertainment Sales Proactive AI Projects Recovery Keyboard Tablets Maintenance Scams Organization Security Cameras iOS Identity Theft WIndows Server 2008 Storage Social Engineering Touchpad OneDrive Sync Firewall PCI DSS PowerPoint Admin eCommerce Compliance Break/Fix FAQ Workstation Hyperlink Windows 10s Office HBO Edge Machine Learning Computer Care Nanotechnology Websites Smartwatch Identity Printers Administrator Screen Mirroring NFL eWaste Virtual Private Network USB Worker Relocation Regulation How To Books Thank You Video Games Experience Hiring/Firing Work/Life Balance Virtual Reality PDF Current Events Electronic Medical Records Twitter Congratulations Crowdsourcing Employer Employee Relationship Phone System Mobile Computing Benefits Save Time Text Messaging Cache Computer Accessories Flexibility Music Smart Technology Monitors Office tips es Scalability Television Analytics CrashOverride Advertising Company Culture Communitications Black Market Cleaning Big Data Automobile HaaS Managing Stress End of Support