"Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

A social engineering campaign targeting over 130 US companies sends employees to a fake malware-laden Virtual Private Network (VPN) page, exploiting concerns about a VPN issue. According to GuidePoint Research and Intelligence Team (GRIT) researchers, the threat actor calls a user on their cell phone and poses as a help desk representative trying to fix a VPN log-in issue. If the threat actor tricks the user, they send an SMS link to a malicious VPN site that masquerades as a legitimate vendor. This article continues to discuss findings regarding the new social engineering campaign.

SC Magazine reports "Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

Submitted by grigby1

Submitted by Gregory Rigby on