Phishing in New Waters: Exploiting Live Chat to Deliver Malware Cyber

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

Phishing in New Waters: Exploiting Live Chat to Deliver Malware

Phishing in New Waters

Phishing schemes are always evolving.  This past year, email thread hijacking took phishing to new depths of subterfuge as criminals hid in plain sight within existing conversations. But no matter how well cybercriminals have refined their messaging or counterfeited legitimate logos and branding, the one constant has always been their delivery method: email.

Until now. Online chat services have become a new target for cybercriminals to introduce documents loaded with malware into organizations. In Kroll’s investigative experience, the scheme plays out like this:

1. Circumventing Automated Support Systems

Actors know the limitations of online chat services, which commonly draw on a knowledge base of FAQs to answer visitor queries. The actor presents an issue not likely to be covered by the FAQs, and most importantly, one that needs to be resolved by uploading some kind of documentation, e.g., a disputed invoice or photo of damaged merchandise.

Phishing in New Waters

Figure 1 - Example of file upload functionality in support ticket creation

2. Create Ticket with Corrupt File Attachment

A ticket is created in the chat system, complete with a zip file attachment. (Actors usually send zip files because antivirus software does not usually detect the malware contained in compressed files).

3. Support Agent Unsuspectingly Extracts Files

The ticket is routed to an unsuspecting user inside the organization, who opens the attachment and unleashes the malware within. In Kroll’s recent experience with this fact pattern, the malware often provides remote access for actors to ultimately leverage the user’s computer as their beachhead to further their intrusion into the victim network with an eye either on data theft (data exfiltration) or a ransomware attack, sometimes within mere hours.

Cyber Security Essentials for Online Chats

Even before the pandemic, organizations were increasingly using live chat to support employees and customers with a variety of tasks. Whether your organization already uses an online chat service or you are considering adding one, here are a few tips that can help protect your environment from chat-related threats:

  • Do Your Diligence
    Most online chat services are provided by third parties that customize their software for your organization. Determine what security measures they implement when creating tickets with attachments. Likewise, ask what resources they have to assess the security of those attachments. Require a level of security that aligns with your expectations and review the service provider’s security stance on a regular basis to ensure they are maintaining situational awareness by keeping up with evolving threats.
  • Open Attachments in a Sandboxed Environment
    Before forwarding the inquiry to the relevant customer service rep or another internal resource, direct all tickets with attachments to trained staff to open in a controlled environment and assess the safety of the contents. Consider rejecting all attachments consisting of zip files and require individual files instead.
  • Protect the Enterprise With Antivirus and/or Endpoint Threat Detection Software
    Early detection of malware can help prevent a bad situation from escalating to a crisis. Ensure processes are in place to guarantee timely updating of antivirus software and consider how your organization can collect telemetry from customer support systems.
  • Consider Using Fill-in Forms
    Rather than accepting attachments, consider technology that allows a user to fill in fields and paste in scanned images of documents/photos that might otherwise be sent as an attachment.
  • If Attachments Are Necessary, Bolster Security Around the Users Receiving the Attachments
    This includes their email accounts, their computers and their technical knowledge and training to know what to do with suspicious files and to leverage a dedicated, separate virtualized desktop environment for that activity.
  • Test Your Online Chat Security
    If you currently offer an online chat option, a vulnerability assessment and/or penetration test can offer peace of mind and highlight opportunities to strengthen your security posture.

Delivering superior service to prospective and existing clients, as well as employees, is an important goal for organizations of all kinds. Online live chat has emerged as one strategy for delivering a quick response for the most asked questions while helping staff focus on more complex issues. But as they always do, cybercriminals have discovered the weaknesses that make this channel ripe for phishing. Organizations should be aware of the threat posed by online chat phishing and act now to close that window as soon as possible.

Phishing in New Waters: Exploiting Live Chat to Deliver Malware 2021-06-23T00:00:00.0000000 /en/insights/publications/cyber/phishing-schemes-online-chat-malware /-/media/kroll/images/publications/featured-images/phishing-in-new-waters.jpg publication {E39587AD-8F0B-4FE2-865F-969BC5501096} {CE2347F0-D222-4014-BA97-6A415CC633DF} {9FDFA7B9-8B48-461E-BAD8-1CF29A23573C} {809E3BA6-ABC7-4C3B-AB97-D7E5B9A66B24} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {7A48DD95-1A63-4784-842F-A2BE81EAFE13}

Other Areas We Can Help

Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk
Incident Response and Litigation Support

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response
Kroll Nominated in Two Categories at the Advisen Cyber Risk Awards

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics

Insights

Cyber

Initial Access Brokers: Fueling the Ransomware Threat  - The Monitor, Issue 17

Cyber
Compliance

The Importance of Jurisdictional Risk When Doing Business with Money Services Businesses

Compliance
Cyber

Data Exfiltration in Ransomware Attacks: Digital Forensics Primer for Lawyers

Cyber