Recently, the threat actors have launched a new voicemail phishing campaign in an attempt to steal Outlook credentials and login credentials to Microsoft Office 365.
The following are the sectors and organizations in the U.S. that were targeted in conjunction with this campaign:
The goal of this ongoing malicious campaign is to lure victims into opening a malicious HTML attachment via fake voicemail notifications which are being used by the hackers to lure their victims. Researchers said.
There are some similarities between TTPs of the recently found campaign and one analyzed in the mid-2020 timeframe. To ensure their communications are routed by spoofing the address of the sender, the threat actors use email services in Japan.
The emails look as if they are coming from an address that belongs to the organization you are trying to target.
Here the email used by the threat actors contains an attachment that appears to be a sound clip because of the use of a music note character in the naming convention.
A phishing site is actually hidden within the obfuscated JavaScript code contained in the file. In order to appear as if the site is a legitimate subdomain of the targeted organization, the URL format follows an assembly method based on the domain of the company being targeted.
In the course of this redirection, the victim is directed to a CAPTCHA verification page. In order to prevent suspicious activity from being spotted by anti-phishing tools and give the victim a false sense of legitimacy, this check is intended to ensure suspicious activity is not identified.
Upon passing the above criteria, the user will be redirected to a phishing page that appears to be genuine, which will then steal their Microsoft Office 365 credentials.
Here below we have mentioned all the domains used by the threat actors:-
Recommendation
As a result, users should always make sure they are on the right login portal before filling in and submitting their username and password.
There is a standard practice in most businesses that recipients log into their accounts. Therefore, a request for them to log in once more to hear the voicemail might seem suspicious.
It’s not new to use HTML attachments as part of phishing to disguise Voicemail-themed scams. It’s been happening since at least 2019, and it’s still quite effective, particularly when employees are careless in handling the email.
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…
ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…
Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…
Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…
Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…