Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

A Day in the Life of a Prolific Voice Phishing Crew

7 January 2025 at 18:41

Besieged by scammers seeking to phish user accounts over the telephone, Apple and Google frequently caution that they will never reach out unbidden to users this way. However, new details about the internal operations of a prolific voice phishing gang show the group routinely abuses legitimate services at Apple and Google to force a variety of outbound communications to their users, including emails, automated phone calls and system-level messages sent to all signed-in devices.

Image: Shutterstock, iHaMoo.

KrebsOnSecurity recently told the saga of a cryptocurrency investor named Tony who was robbed of more than $4.7 million in an elaborate voice phishing attack. In Tony’s ordeal, the crooks appear to have initially contacted him via Google Assistant, an AI-based service that can engage in two-way conversations. The phishers also abused legitimate Google services to send Tony an email from google.com, and to send a Google account recovery prompt to all of his signed-in devices.

Today’s story pivots off of Tony’s heist and new details shared by a scammer to explain how these voice phishing groups are abusing a legitimate Apple telephone support line to generate “account confirmation” message prompts from Apple to their customers.

Before we get to the Apple scam in detail, we need to revisit Tony’s case. The phishing domain used to steal roughly $4.7 million in cryptocurrencies from Tony was verify-trezor[.]io. This domain was featured in a writeup from February 2024 by the security firm Lookout, which found it was one of dozens being used by a prolific and audacious voice phishing group it dubbed “Crypto Chameleon.”

Crypto Chameleon was brazenly trying to voice phish employees at the U.S. Federal Communications Commission (FCC), as well as those working at the cryptocurrency exchanges Coinbase and Binance. Lookout researchers discovered multiple voice phishing groups were using a new phishing kit that closely mimicked the single sign-on pages for Okta and other authentication providers.

As we’ll see in a moment, that phishing kit is operated and rented out by a cybercriminal known as “Perm” a.k.a. “Annie.” Perm is the current administrator of Star Fraud, one of the more consequential cybercrime communities on Telegram and one that has emerged as a foundry of innovation in voice phishing attacks.

A review of the many messages that Perm posted to Star Fraud and other Telegram channels showed they worked closely with another cybercriminal who went by the handles “Aristotle” and just “Stotle.”

It is not clear what caused the rift, but at some point last year Stotle decided to turn on his erstwhile business partner Perm, sharing extremely detailed videos, tutorials and secrets that shed new light on how these phishing panels operate.

Stotle explained that the division of spoils from each robbery is decided in advance by all participants. Some co-conspirators will be paid a set fee for each call, while others are promised a percentage of any overall amount stolen. The person in charge of managing or renting out the phishing panel to others will generally take a percentage of each theft, which in Perm’s case is 10 percent.

When the phishing group settles on a target of interest, the scammers will create and join a new Discord channel. This allows each logged on member to share what is currently on their screen, and these screens are tiled in a series of boxes so that everyone can see all other call participant screens at once.

Each participant in the call has a specific role, including:

-The Caller: The person speaking and trying to social engineer the target.
-The Operator: The individual managing the phishing panel, silently moving the victim from page to page.
-The Drainer: The person who logs into compromised accounts to drain the victim’s funds.
-The Owner: The phishing panel owner, who will frequently listen in on and participate in scam calls.

‘OKAY, SO THIS REALLY IS APPLE’

In one video of a live voice phishing attack shared by Stotle, scammers using Perm’s panel targeted a musician in California. Throughout the video, we can see Perm monitoring the conversation and operating the phishing panel in the upper right corner of the screen.

In the first step of the attack, they peppered the target’s Apple device with notifications from Apple by attempting to reset his password. Then a “Michael Keen” called him, spoofing Apple’s phone number and saying they were with Apple’s account recovery team.

The target told Michael that someone was trying to change his password, which Michael calmly explained they would investigate. Michael said he was going to send a prompt to the man’s device, and proceeded to place a call to an automated line that answered as Apple support saying, “I’d like to send a consent notification to your Apple devices. Do I have permission to do that?”

In this segment of the video, we can see the operator of the panel is calling the real Apple customer support phone number 800-275-2273, but they are doing so by spoofing the target’s phone number (the victim’s number is redacted in the video above). That’s because calling this support number from a phone number tied to an Apple account and selecting “1” for “yes” will then send an alert from Apple that displays the following message on all associated devices:

Calling the Apple support number 800-275-2273 from a phone number tied to an Apple account will cause a prompt similar to this one to appear on all connected Apple devices.

KrebsOnSecurity asked two different security firms to test this using the caller ID spoofing service shown in Perm’s video, and sure enough calling that 800 number for Apple by spoofing my phone number as the source caused the Apple Account Confirmation to pop up on all of my signed-in Apple devices.

In essence, the voice phishers are using an automated Apple phone support line to send notifications from Apple and to trick people into thinking they’re really talking with Apple. The phishing panel video leaked by Stotle shows this technique fooled the target, who felt completely at ease that he was talking to Apple after receiving the support prompt on his iPhone.

“Okay, so this really is Apple,” the man said after receiving the alert from Apple. “Yeah, that’s definitely not me trying to reset my password.”

“Not a problem, we can go ahead and take care of this today,” Michael replied. “I’ll go ahead and prompt your device with the steps to close out this ticket. Before I do that, I do highly suggest that you change your password in the settings app of your device.”

The target said they weren’t sure exactly how to do that. Michael replied “no problem,” and then described how to change the account password, which the man said he did on his own device. At this point, the musician was still in control of his iCloud account.

“Password is changed,” the man said. “I don’t know what that was, but I appreciate the call.”

“Yup,” Michael replied, setting up the killer blow. “I’ll go ahead and prompt you with the next step to close out this ticket. Please give me one moment.”

The target then received a text message that referenced information about his account, stating that he was in a support call with Michael. Included in the message was a link to a website that mimicked Apple’s iCloud login page — 17505-apple[.]com. Once the target navigated to the phishing page, the video showed Perm’s screen in the upper right corner opening the phishing page from their end.

“Oh okay, now I log in with my Apple ID?,” the man asked.

“Yup, then just follow the steps it requires, and if you need any help, just let me know,” Michael replied.

As the victim typed in their Apple password and one-time passcode at the fake Apple site, Perm’s screen could be seen in the background logging into the victim’s iCloud account.

It’s unclear whether the phishers were able to steal any cryptocurrency from the victim in this case, who did not respond to requests for comment. However, shortly after this video was recorded, someone leaked several music recordings stolen from the victim’s iCloud account.

At the conclusion of the call, Michael offered to configure the victim’s Apple profile so that any further changes to the account would need to happen in person at a physical Apple store. This appears to be one of several scripted ploys used by these voice phishers to gain and maintain the target’s confidence.

A tutorial shared by Stotle titled “Social Engineering Script” includes a number of tips for scam callers that can help establish trust or a rapport with their prey. When the callers are impersonating Coinbase employees, for example, they will offer to sign the user up for the company’s free security email newsletter.

“Also, for your security, we are able to subscribe you to Coinbase Bytes, which will basically give you updates to your email about data breaches and updates to your Coinbase account,” the script reads. “So we should have gone ahead and successfully subscribed you, and you should have gotten an email confirmation. Please let me know if that is the case. Alright, perfect.”

In reality, all they are doing is entering the target’s email address into Coinbase’s public email newsletter signup page, but it’s a remarkably effective technique because it demonstrates to the would-be victim that the caller has the ability to send emails from Coinbase.com.

Asked to comment for this story, Apple said there has been no breach, hack, or technical exploit of iCloud or Apple services, and that the company is continuously adding new protections to address new and emerging threats. For example, it said it has implemented rate limiting for multi-factor authentication requests, which have been abused by voice phishing groups to impersonate Apple.

Apple said its representatives will never ask users to provide their password, device passcode, or two-factor authentication code or to enter it into a web page, even if it looks like an official Apple website. If a user receives a message or call that claims to be from Apple, here is what the user should expect.

AUTODOXERS

According to Stotle, the target lists used by their phishing callers originate mostly from a few crypto-related data breaches, including the 2022 and 2024 breaches involving user account data stolen from cryptocurrency hardware wallet vendor Trezor.

Perm’s group and other crypto phishing gangs rely on a mix of homemade code and third-party data broker services to refine their target lists. Known as “autodoxers,” these tools help phishing gangs quickly automate the acquisition and/or verification of personal data on a target prior to each call attempt.

One “autodoxer” service advertised on Telegram that promotes a range of voice phishing tools and services.

Stotle said their autodoxer used a Telegram bot that leverages hacked accounts at consumer data brokers to gather a wealth of information about their targets, including their full Social Security number, date of birth, current and previous addresses, employer, and the names of family members.

The autodoxers are used to verify that each email address on a target list has an active account at Coinbase or another cryptocurrency exchange, ensuring that the attackers don’t waste time calling people who have no cryptocurrency to steal.

Some of these autodoxer tools also will check the value of the target’s home address at property search services online, and then sort the target lists so that the wealthiest are at the top.

CRYPTO THIEVES IN THE SHARK TANK

Stotle’s messages on Discord and Telegram show that a phishing group renting Perm’s panel voice-phished tens of thousands of dollars worth of cryptocurrency from the billionaire Mark Cuban.

“I was an idiot,” Cuban told KrebsOnsecurity when asked about the June 2024 attack, which he first disclosed in a short-lived post on Twitter/X. “We were shooting Shark Tank and I was rushing between pitches.”

Image: Shutterstock, ssi77.

Cuban said he first received a notice from Google that someone had tried to log in to his account. Then he got a call from what appeared to be a Google phone number. Cuban said he ignored several of these emails and calls until he decided they probably wouldn’t stop unless he answered.

“So I answered, and wasn’t paying enough attention,” he said. “They asked for the circled number that comes up on the screen. Like a moron, I gave it to them, and they were in.”

Unfortunately for Cuban, somewhere in his inbox were the secret “seed phrases” protecting two of his cryptocurrency accounts, and armed with those credentials the crooks were able to drain his funds. All told, the thieves managed to steal roughly $43,000 worth of cryptocurrencies from Cuban’s wallets — a relatively small heist for this crew.

“They must have done some keyword searches,” once inside his Gmail account, Cuban said. “I had sent myself an email I had forgotten about that had my seed words for 2 accounts that weren’t very active any longer. I had moved almost everything but some smaller balances to Coinbase.”

LIFE IS A GAME: MONEY IS HOW WE KEEP SCORE

Cybercriminals involved in voice phishing communities on Telegram are universally obsessed with their crypto holdings, mainly because in this community one’s demonstrable wealth is primarily what confers social status. It is not uncommon to see members sizing one another up using a verbal shorthand of “figs,” as in figures of crypto wealth.

For example, a low-level caller with no experience will sometimes be mockingly referred to as a 3fig or 3f, as in a person with less than $1,000 to their name. Salaries for callers are often also referenced this way, e.g. “Weekly salary: 5f.”

This meme shared by Stotle uses humor to depict an all-too-common pathway for voice phishing callers, who are often minors recruited from gaming networks like Minecraft and Roblox. The image that Lookout used in its blog post for Crypto Chameleon can be seen in the lower right hooded figure.

Voice phishing groups frequently require new members to provide “proof of funds” — screenshots of their crypto holdings, ostensibly to demonstrate they are not penniless — before they’re allowed to join.

This proof of funds (POF) demand is typical among thieves selling high-dollar items, because it tends to cut down on the time-wasting inquiries from criminals who can’t afford what’s for sale anyway. But it has become so common in cybercrime communities that there are now several services designed to create fake POF images and videos, allowing customers to brag about large crypto holdings without actually possessing said wealth.

Several of the phishing panel videos shared by Stotle feature audio that suggests co-conspirators were practicing responses to certain call scenarios, while other members of the phishing group critiqued them or tried disrupt their social engineering by being verbally abusive.

These groups will organize and operate for a few weeks, but tend to disintegrate when one member of the conspiracy decides to steal some or all of the loot, referred to in these communities as “snaking” others out of their agreed-upon sums. Almost invariably, the phishing groups will splinter apart over the drama caused by one of these snaking events, and individual members eventually will then re-form a new phishing group.

Allison Nixon is the chief research officer for Unit 221B, a cybersecurity firm in New York that has worked on a number of investigations involving these voice phishing groups. Nixon said the constant snaking within the voice phishing circles points to a psychological self-selection phenomenon that is in desperate need of academic study.

“In short, a person whose moral compass lets them rob old people will also be a bad business partner,” Nixon said. “This is another fundamental flaw in this ecosystem and why most groups end in betrayal. This structural problem is great for journalists and the police too. Lots of snitching.”

POINTS FOR BRAZENNESS

Asked about the size of Perm’s phishing enterprise, Stotle said there were dozens of distinct phishing groups paying to use Perm’s panel. He said each group was assigned their own subdomain on Perm’s main “command and control server,” which naturally uses the domain name commandandcontrolserver[.]com.

A review of that domain’s history via DomainTools.com shows there are at least 57 separate subdomains scattered across commandandcontrolserver[.]com and two other related control domains — thebackendserver[.]com and lookoutsucks[.]com. That latter domain was created and deployed shortly after Lookout published its blog post on Crypto Chameleon.

The dozens of phishing domains that phone home to these control servers are all kept offline when they are not actively being used in phishing attacks. A social engineering training guide shared by Stotle explains this practice minimizes the chances that a phishing domain will get “redpaged,” a reference to the default red warning pages served by Google Chrome or Firefox whenever someone tries to visit a site that’s been flagged for phishing or distributing malware.

What’s more, while the phishing sites are live their operators typically place a CAPTCHA challenge in front of the main page to prevent security services from scanning and flagging the sites as malicious.

It may seem odd that so many cybercriminal groups operate so openly on instant collaboration networks like Telegram and Discord. After all, this blog is replete with stories about cybercriminals getting caught thanks to personal details they inadvertently leaked or disclosed themselves.

Nixon said the relative openness of these cybercrime communities makes them inherently risky, but it also allows for the rapid formation and recruitment of new potential co-conspirators. Moreover, today’s English-speaking cybercriminals tend to be more afraid of getting home invaded or mugged by fellow cyber thieves than they are of being arrested by authorities.

“The biggest structural threat to the online criminal ecosystem is not the police or researchers, it is fellow criminals,” Nixon said. “To protect them from themselves, every criminal forum and marketplace has a reputation system, even though they know it’s a major liability when the police come. That is why I am not worried as we see criminals migrate to various ‘encrypted’ platforms that promise to ignore the police. To protect themselves better against the law, they have to ditch their protections against fellow criminals and that’s not going to happen.”

Meta makes major move back to free speech and ends 3rd-party fact-checking program

9 January 2025 at 08:00

In 2022, Elon Musk acquired Twitter and made a series of changes to the platform, including changing its name to X and introducing Community Notes, which is a feature that allows users to add context or fact-check potentially misleading posts.

This approach differs from Meta’s model, which relies on third-party, independent fact-checking organizations to flag misleading posts on Instagram, Facebook and Threads (its rival to X). 

However, CEO Mark Zuckerberg recently announced that Meta will stop working with these organizations and instead implement an X-like Community Notes feature. Zuckerberg also revealed a series of other major changes to the company's moderation policies and practices, aimed at offering people more freedom of expression.

I’M GIVING AWAY THE LATEST & GREATEST AIRPODS PRO 2

Zuckerberg announced Tuesday that the social media company would stop working with third-party fact-checking organizations. In a video posted on Instagram and Facebook, Zuckerberg said the company's content moderation approach resulted too often in "censorship."

"After Trump first got elected in 2016, the legacy media wrote nonstop about how misinformation was a threat to democracy. We tried in good faith to address those concerns without becoming the arbiters of truth," Zuckerberg said. "But the fact-checkers have just been too politically biased and have destroyed more trust than they've created, especially in the U.S."

Zuckerberg said that Meta will end its fact-checking program with trusted partners and replace it with a community-driven system similar to X’s Community Notes.

For the unaware, Community Notes on X allows users to collaboratively add context or fact-check potentially misleading posts. When a tweet is flagged for misinformation or lack of context, users can submit notes that provide additional information or correct inaccuracies. 

These notes are then reviewed by other users, who can upvote or downvote the contributions based on their helpfulness and accuracy. If a note receives enough support, it becomes visible beneath the original tweet, offering a balanced view and helping to inform others.

HOW TO PROTECT YOURSELF FROM SOCIAL MEDIA SCAMMERS

Independent fact-checkers, however, aren’t happy with the change.

"Fact-checking journalism has never censored or removed posts; it’s added information and context to controversial claims, and it’s debunked hoax content and conspiracy theories. The fact-checkers used by Meta follow a code of principles requiring nonpartisanship and transparency," said Angie Drobnic Holan, director of the International Fact-Checking Network.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

HOW TO PROTECT YOUR FACEBOOK ACCOUNT FROM HACKERS

Zuckerberg also revealed plans to overhaul Meta's recommendation system, which determines the content shown to users. For years, the company has restricted political content, citing user feedback and concerns about the impact of social media on beliefs.

"We built a lot of complex systems to moderate content, but the problem with complex systems is they make mistakes," Zuckerberg said. "Even if they accidentally censor just 1% of posts, that's millions of people, and we've reached a point where it's just too many mistakes and too much censorship."

He added that Meta would eliminate some content policies on controversial issues, including immigration and gender, and refocus its automated moderation on what he described as high-severity violations. The company will now take a more personalized approach to political content so that people who want to see more of it in their feeds can see it.

In addition, Facebook will relocate its trust and safety and content moderation teams from California to Texas. Zuckerberg also said Meta would collaborate with the incoming Trump administration to promote free speech globally, though he did not provide specific details.

GET FOX BUSINESS ON THE GO BY CLICKING HERE

FACEBOOK AND INSTAGRAM ARE USING YOUR DATA TO TRAIN AI: LEARN HOW TO PROTECT YOURSELF

Meta's platforms, like Facebook and Instagram, have been more tightly moderated compared to platforms like X, which has meant less freedom of expression for users. The changes Zuckerberg announced on Tuesday aim to relax those rules, letting people share their thoughts more freely. This could lead to more offensive content, but that's the trade-off for more freedom. The introduction of Community Notes is a good change, too, as it gives users more control instead of leaving it to a small group of people who might be biased toward a certain political party or issue.

What do you think about the changes Zuckerberg is making to Meta’s content moderation? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you'd like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Scammers are targeting teens with these nasty tricks

27 December 2024 at 16:03

A 14-year-old committed suicide after following the advice of an AI chatbot. Another family is suing the same one — Character AI — after it told an autistic 14-year-old to kill his parents. It also exposed an 11-year-old to sexual content.

These stories are heavy reminders that young people are especially vulnerable on the internet, but AI isn’t the only thing targeting them.

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS' PHOTOS ON SOCIAL MEDIA

The fine folks at the FBI’s crime division say teens lost 2,500% more money to scams over a recent five-year stretch. Compare that to an 805% increase for seniors, which is still not great, but at least it’s not 2,500%.

So, why teens? Because thieves have more ways than ever to target them. Talk to anyone in your circle born between 1996 and 2010 about this. It’s a big deal.

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

The most prevalent scams and tricks

Under the influence: Say a kiddo in your family idolizes an online influencer. That person is so easy to impersonate. All a fraudster has to do is set up a phony account that looks real, run a contest and trick "winners" into handing over their personal details (or more) to claim their (nonexistent) prizes. Done and done.

Pro tip: Stick to "official" influencer accounts with substantial follower counts. A smaller account is almost always a scammer, not some secret one. And never give financial info or money to someone via DM.

‘Hey there, handsome’: This is a classic for a reason. Scammers grab pictures of an attractive teen or 20-something and play digital Casanovas. All too soon, they profess their love — then comes the request for money, gifts or info.

Pro tip: Try a reverse image search to see if those pics pop up elsewhere online. If the person refuses to video call or meet you in person, it’s a bad sign.

RELATED: Deepfakes are so easy to make. Talk to your kids.

‘Send me a photo’: This is the dangerous intersection of smartphones, sexting and scammers. Someone shares sexy pictures and asks for some in return. As soon as the victim sends a pic or video, everything changes.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

The person on the other end is now blackmailing them. Pay up or they’ll share the content with everyone the victim knows. Think about how horrifying that would be at any age, but especially as a teenager. I spoke to a family that lost their son to suicide after this happened to him. Such a heartbreaking story, and they’re not alone; this is way too common.

Pro tip: Talk to your kids about sending pictures to others online. Urge them to never share anything explicit, even with someone they know in person and trust. It’s just not worth it.

‘You won!’ … Not": This one targets younger teens. A thief tricks them into revealing credit card details or downloading malware under the guise of rewards in their favorite game.

Pro tip: This one’s easy. Only ever buy apps or make in-app purchases through an official app store — no trades and nothing "private."

So, what can you do?

The internet is an incredible resource for learning, creativity and fun, but let’s not sugarcoat it: there are dangers out there. Scammers and predators have become experts at manipulation, and kids can easily fall victim. The most important thing you can do as a parent? Foster open, honest communication.

When my son was younger, I shared age-appropriate stories about what he might encounter online. We talked about the risks in a way he could understand. He knew that if anything or anyone made him feel uncomfortable, he should come to me immediately, no questions asked.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

That’s the foundation: trust. Kids need to know that they won’t get in trouble for being fooled. Today’s online predators are sneaky, and scammers know exactly how to win a child’s trust. If your child is targeted, it’s never their fault. 

Here’s my free tech safety contract you both can sign if you’re not sure where to start the conversation around tech limits.

Action plan for parents

Remember when you had a fake driver’s license or told a little white lie to get what you wanted? Kids have ways around parental controls and are smart enough to spin the birth year wheel when signing up to get around age restrictions. 

RELATED: Best apps and gadgets to monitor your kid (from preschool to teens)

Set clear ground rules for screen time and device use, and keep the conversation going as they grow. A few simple steps to take:

The best protection is being your child’s go-to resource for help and guidance. Let your kids know you’re there, ready to listen, no matter what. That’s the real safety net.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.

NASA Artemis Moon Missions Delayed Until 2026 and 2027

5 December 2024 at 21:05
It is unclear where the program to go back to the lunar surface will head after President-elect Donald J. Trump returns to the White House in January.

© Chandan Khanna/Agence France-Presse — Getty Images

Part of the NASA’s Space Launch System rocket in July. The vehicle is to be used for the agency’s Artemis return-to-moon missions, the second of which was postponed on Wednesday.

Did Trump Drain Democrats’ Energy? These Races Will Be the First Test.

8 December 2024 at 05:00
As Democrats try to fire up their fatigued base, two contests for the Virginia legislature will serve as the first measure of partisan enthusiasm since Donald J. Trump’s victory.

© Alyssa Schukar for The New York Times

JJ Singh, a first-time candidate and a Democrat, is running for a seat in the Virginia House of Delegates in a special election to be held in January.
❌
❌