CIO News Hubb
Advertisement
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact
No Result
View All Result
CIO News Hubb
No Result
View All Result
Home Information Security

New ‘Letscall’ Malware Employs Voice Traffic Routing

admin by admin
July 8, 2023
in Information Security


Jul 07, 2023Swati KhandelwalMobile Security / Malware

Researchers have issued a warning about an emerging and advanced form of voice phishing (vishing) known as “Letscall.” This technique is currently targeting individuals in South Korea.

The criminals behind “Letscall” employ a multi-step attack to deceive victims into downloading malicious apps from a counterfeit Google Play Store website.

Once the malicious software is installed, it redirects incoming calls to a call center under the control of the criminals. Trained operators posing as bank employees then extract sensitive information from unsuspecting victims.

To facilitate the routing of voice traffic, “Letscall” utilizes cutting-edge technologies such as voice over IP (VOIP) and WebRTC. It also makes use of Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols, including Google STUN servers, to ensure high-quality phone or video calls and bypass NAT and firewall restrictions.

The “Letscall” group consists of Android developers, designers, frontend and backend developers, as well as call operators specializing in voice social engineering attacks.

The malware operates in three stages: first, a downloader app prepares the victim’s device, paving the way for the installation of powerful spyware. This spyware then triggers the final stage, which allows the rerouting of incoming calls to the attackers’ call center.

Voice Traffic Routing

“The third stage has its own set of commands, which also includes Web socket commands. Some of these commands relate to the manipulation of the address book, such as creating and removing contacts. Other commands relate to creating, modifying, and removing the filters that determine which calls should be intercepted and which should be ignored,” Dutch mobile security firm ThreatFabric said in its report.

What sets “Letscall” apart is its utilization of advanced evasion techniques. The malware incorporates Tencent Legu and Bangcle (SecShell) obfuscation during the initial download. In later stages, it employs complex naming structures in ZIP file directories and intentionally corrupts the manifest to confuse and bypass security systems.

Voice Traffic Routing

Criminals have developed systems that automatically call victims and play pre-recorded messages to further deceive them. By combining mobile phone infections with vishing techniques, these fraudsters can request micro-loans in the victims’ names while assuring them of suspicious activities and redirecting calls to their centers.

UPCOMING WEBINAR

🔐 Privileged Access Management: Learn How to Conquer Key Challenges

Discover different approaches to conquer Privileged Account Management (PAM) challenges and level up your privileged access security strategy.

Reserve Your Spot

The consequences of such attacks can be significant, leaving victims burdened with substantial loans to repay. Financial institutions often underestimate the severity of these invasions and fail to investigate potential fraud.

Although this threat is currently limited to South Korea, researchers caution that there are no technical barriers preventing these attackers from expanding to other regions, including the European Union.

This new form of vishing attack underscores the constant evolution of criminal tactics and their ability to exploit technology for malicious purposes. The group responsible for the “Letscall” malware demonstrates intricate knowledge of Android security and voice routing technologies.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
Previous Post

IAM Policies and Bucket Policies and ACLs! Oh, My! (Controlling Access to S3 Resources)

Next Post

Innerguidance

Related Posts

Information Security

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

by admin
September 30, 2023
Information Security

Manage AWS Security Hub using CloudFormation

by admin
September 30, 2023
Information Security

Is that how it works? Hacking and scamming in popular TV shows

by admin
September 30, 2023
Information Security

Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts

by admin
September 29, 2023
Information Security

Get the full benefits of IMDSv2 and disable IMDSv1 across your AWS infrastructure

by admin
September 29, 2023
Next Post

Innerguidance

Recommended

InnovationBreakthrough Chapter V Innovation Risk Management ~ Future of CIO

September 30, 2023

New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks

September 30, 2023

Manage AWS Security Hub using CloudFormation

September 30, 2023

Is that how it works? Hacking and scamming in popular TV shows

September 30, 2023

InnovationBreakthrough Introduction:Chapter 3 Business Model Innovation ~ Future of CIO

September 29, 2023

Cisco Warns of Vulnerability in IOS and IOS XE Software After Exploitation Attempts

September 29, 2023

© CIO News Hubb All rights reserved.

Use of these names, logos, and brands does not imply endorsement unless specified. By using this site, you agree to the Privacy Policy and Terms & Conditions.

Navigate Site

  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

Newsletter Sign Up

No Result
View All Result
  • Home
  • News
  • Operations CIO
  • Visionary CIO
  • IT Management
  • Information Security
  • Contact

© 2022 CIO News Hubb All rights reserved.