A new WhatsApp phishing campaign attempting to spread information-stealing malware to over 27,000 email addresses through voice message feature manipulations has just been discovered.
The phishing attack has the ability to bypass email spam filters and then it unleashes malware on victims’ computers. The threat is higher and the hack is easier to infect those devices without antivirus software installed.
Looking into the issue for Digital Journal Josh Rickard, Security Automation Architect at Swimlane.
Rickard begins his analysis by considering the nature of the attack, noting: “Phishing attacks are one of the most common methods of cyberattacks and, unfortunately, have become all too easy for cybercriminals to leverage.”
In terms of how this form of attack works, he continues: “ These types of social engineering attacks that exploit human error are highly effective and well-masked. In this case, WhatsApps’s voice message feature was manipulated in an attempt to spread information-stealing malware to over 27,000 email addresses associated with the app.”
Rickard also notes that businesses continuously face a barrage of these types of malicious threats: “Gone are the days when phishing was a single act targeting a specific individual. Today, malicious emails, texts and phone calls have grown into a vehicle for targeted attacks against entire organizations.”
There also resource issues, says Rickard: “Many SecOps teams do not have the bandwidth, time-tested processes or the data to properly investigate suspicious communications. Luckily, advancements in cybersecurity are easing the burden.”
As to what these solutions are, Rickard continues: “Versatile platforms that have the ability to centralize detection, response and investigation protocols into a single, streamlined process allow security teams to gain the visibility needed to properly mitigate threats, including those related to phishing, in real time.”
Rickard’s remaining recommendations are: “Leveraging low-code security automation organization-wide makes implementing these features extremely easy, ultimately enabling security and IT teams to more effectively defend against advanced attacks.”