The operators of the BazarCall call back phishing attacks are upgrading the social engineering tactics used to deploy malware in victim networks. According to cybersecurity firm Trelix, the program serves as an entry point for financial fraud. Simply put, BazarCall delivers the next level of payloads such as ransomware.
BazarCall is known to spread BazarBackdoor alias BazarLoader by manipulating potential victims to call a phone number specified in decoy email messages.
The decoy email messages inform users of the renewal of a trial subscription, such as an antivirus service, and urge them to contact their support desk to cancel the plan or risk being automatically charged for the premium version of the software.
The aim of the attack is to allow remote access to the endpoint that pretends to terminate the supposed subscription or install a security solution to rid the machine of malware.
Various strategies ask the victim to launch a special URL specifically designed to download and run a malicious executable file that stores the legitimate ScreenConnect remote desktop software.
After persistence access has been achieved, the attacker opens fake cancellation forms asking victims to fill in personal details and log into their bank accounts to complete the refund. This strategy is used to deceive victims into sending the money to the scammer.
The sources for this piece include an article in TheHackerNews.