Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Voice Phishing Campaigns Using Access Keys
Identity Theft, Fraud, Scams
October 14, 2023
Cofense
The phishing attack starts with an HTML file disguised as a voice message, which leads to the download of a file hosted on a disguised AWS URL. The attackers initially impersonate Zoom but later switch to spoofing Outlook and Teams login pages.
Read More
Voice Phishing
Phishing campaign
access keys
Zoom
Fake Login Page
Publisher
Previous
As Biohacking Evolves, How Vulnerable are we to Cyber T ...
Emerging Threats
Next
Kwik Trip IT Systems Outage Caused by Mysterious ‘Netwo ...
Breaches and Incidents