This is not the first time the attackers have used this tactic.
The Rise of Phishing Attacks
Phishing attacks have become increasingly sophisticated and widespread in recent years. According to a report by the Anti-Phishing Working Group, there were over 1.4 million phishing emails sent in the United States alone in 2022. This number has been steadily increasing, with a 50% rise in phishing emails compared to the previous year.
Types of Phishing Attacks
Phishing attacks can take many forms, including:
The US Social Security Administration as a Target
The US Social Security Administration (SSA) has been a frequent target of phishing attacks. In the case of the recent emails, the attackers impersonated the SSA to gain the trust of recipients. The goal was to deploy the ConnectWise Remote Access Trojan (RAT), a malicious software that allows attackers to remotely access and control a victim’s device.
The Connection to the 2024 US Presidential Elections
The increase in phishing emails in the days leading up to the 2024 US presidential elections suggests a deliberate attempt to disrupt the democratic process.
The Rise of Phishing Campaigns
Phishing campaigns have become increasingly sophisticated in recent years, with scammers continually adapting their tactics to evade detection. One of the most common types of phishing attacks is the “spoofing” campaign, where attackers pose as a legitimate organization, such as a government agency or a well-known company, to trick victims into divulging sensitive information.
The Social Security Administration Campaign
The specific campaign in question targeted the Social Security Administration, with scammers claiming to provide an updated benefits statement. This type of phishing campaign is particularly insidious, as it preys on individuals who are already vulnerable due to their financial situation.
This is done by exploiting vulnerabilities in the software’s code, which can be found in the most recent versions of the software.
The Rise of Remote Desktop Exploitation
Remote desktop exploitation has become a significant concern in recent years. The rise of remote work and the increasing use of remote desktop tools have created new vulnerabilities that cybercriminals can exploit. ConnectWise Control, a legitimate remote desktop and support tool, has become a target for threat actors.
How Cybercriminals Exploit ConnectWise Control
Cybercriminals exploit ConnectWise Control by deploying it stealthily, often through phishing attacks or exploiting vulnerabilities in the software’s code.
You might also like