New BazarCall Attack Variant Discovered: Threat Actors Leverage Google Form With Call-Back Phishing

Abnormal Security has revealed its discovery of a novel BazarCall phishing attack variant that incorporates using Google Forms to increase the appearance of legitimacy and elevate the perceived authenticity of the initial malicious emails. The new attack report demonstrates an email sent by threat actors as part of the phishing attack with a real-world example of a Google Form with details similar to those used in a traditional BazarCall attack. 

BazarCall/BazaCall, aka call-back phishing, is a remarkably sophisticated strategy attack type that gained notoriety in 2020 due to its abnormal method of distributing malware – manipulating victims to interact with the attackers through a simple phone call. BazarCall attacks typically start with a phishing email designed to appear as a payment notification or subscription confirmation from a known brand. 

The attacker creates a Google Form and adds details about the fake transaction, including an invoice number and date, method of payment, and information about the product or service that was purportedly purchased; enable the response receipt option on the Settings tab and send the invitation to complete the form to themselves. When the invitation arrives, the attacker clicks the Fill Out Form button, which opens the Google Form. 

You can read all the details here.

2 Responses to “New BazarCall Attack Variant Discovered: Threat Actors Leverage Google Form With Call-Back Phishing”

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading