Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the social-pug domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/blog/wp-includes/functions.php on line 6121
Old Scams Are Now Getting A New Life In Today’s CyberWorld

Old Scams Are Now Getting A New Life in Today’s CyberWorld

Marketing Team Cloud Security Expert - CloudCodes Software
  • April 6th, 2021

Let’s know about some Old Scams

In today’s digitization world, scammers are using a new technique to reach potential victims – sending an email and SMS, which comprises of links to common services like Alibaba cloud, Google Docs, Azure, and AWS. We have observed this sort of technique used for popular old scams like dating sites, tech support, and fake pharmacies that aim at stealing PII or blackmail victims. Today’s post is going to aware readers about some particular examples of the old scams & the strategy used by hackers to perform their scams and expand the causes why we are assuring it gain popularity.

Let’s See How Scammers Use Tech Support Trick

Tech support scams have been hosted in Alibaba, Azure, and AWS, with scammers rapidly shifting from one store to another, utilizing apparently arbitrary names. Some examples of static store URLs, which were hosting these old scams at the writing time are shown in the following figure.

Old Scams

Another example depicts a page that was hosted at one of these links. In this scenario, a fraud Microsoft support web page convince the target to call for support. This work allows scammers to enforce social engineering tactics to fetch the credit card information. The simple way of quickly switching to another URL and poor hosting cost makes the services like AWS, Azure, and Alibaba a feasible target for scammers. Names in the object store can quickly get generated via a domain generation algorithm for making the terminating scams tough. Also, hackers can use compromised tenants or configure object stores in an incorrect manner to host the payloads.

Old Scams

Its Time to Track the Use of G Docs in Smishing

In this example, you are going to notice that scammers are misusing G Docs for creating presentations and sharing them via smishing (SMS based phishing) and phishing. The presentation serves as a bait to secretively store the malicious link behind it.

Old Scams

The links of Google Docs help hackers in bypassing spam filters that brief their use in phishing emails. The more curious part is the use of G Docs link in smishing. Google applications are already present in Android devices and are the most downloaded apps in iOS phones. This means that the link on smartphones are likely to get launch in its native application, where UX is seamless and clean, and the individual may have their low-security level. For example – the following figure shows the points of a hidden link to a website promising to provide adult content and dating services for free. It then greed users to tell their personal details like credit card information and email for age validation purpose.

4

Why Old Scams Are Still So Popular?

There are three main causes behind the increasing popularity of online services for known scams:

  1. Low and Dynamic Hosting – Use of online platforms like AWS, Google Drives, Azure, etc., enables attackers with the flexibility of moving here and there when their URLs are taken down. Open objects stores and the use of compromised tenants make the process more cost effective.
  2. Bypassing Traditional Data – Attaching the links with trusted services help hackers to bypass the traditional content filters like spam filters that may otherwise restrict the scams.
  3. Victims Get Easily Convinced – Services offered by AWS and Google Drive do not originate the same red flags as for the traditional malicious links. Besides this, the mobile data make it simpler for hackers to disguise malicious URLs like legitimate information.

How CloudCodes Provide the Protection?

CloudCodes CASB solution is programmed with such technologies that it has the capability of detecting the tech support scams. It restricts end users from opening untrusted, external Google Docs and hence, prevent them from unintentionally being getting saved or reshared.

Scammers using cloud computing services were inevitable. It provides them scale, helps them to ignore content filtering, and offers them a fresh channel where victims can have their guard down. While recently only being utilized for long-running scams aiming users, these approaches can also be utilized for targeted large enterprises who use services like Google Drive. In order to be safe from old scams and the trending one too, we have to immediately start educating people in our surroundings and companies should enforce Cyber security controls to secure themselves from the onslaught of hackers misusing cloud services

Share