Hooked by the Call: A Deep Dive into The Tricks Used in Callback Phishing Emails
cybersecurity penetration_testing penetrationtesting security vulnerabilityIntroduction
Previously, Trustwave SpiderLabs covered a massiveĀ fake orderĀ spam scheme that impersonated a tech support company and propagated via Google Groups. Since then, we have observed more spam campaigns using this hybrid form of cyberattack with varying tactics, techniques, and procedures (TTP). Between July and September, we witnessed a 140% increase in these spam campaigns. In this blog, we will showcase the different spam techniques used in these phishing emails.
Go to Source