Methods
phone email sms voicemail chatbot physical
Payloads
doc docx xls xlsx ppt pptx pdf hta exe bat zip xss csrf click-once phishing page ole drive-by-download usb drop cloud hosted file
Goals
cred harvest malware physical access info gather bec
Description

Services like Google Voice email their users when they receive a new voicemail. Often, the email contains a transcribed preview of the voicemail as well as a link to listen to it. In this pretext, send an email that states the target missed a phone call and include a link to the audio file. Consider adding a transcribed preview of the voicemail with something intriguing and relevant to the target. Attackers could attempt to further personalize the email by identifying which VoIP provider the company uses and copying the legitimate email design that service sends to users. There's a few ways to do this, including checking job postings for IT or support staff, or by calling an actual employee's voicemail and attempting to login. Often times when you login to a voicemail system, it will say what brand VoIP the company uses. The payload could be varied, but generally include phishing pages for credential harvesting or drive-by-download attacks.

Example Email(s)

Source: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/office-365-users-targeted-by-voicemail-scam-pages/

Source: https://www.greathorn.com/blog-phishing-emails-explained-new-voicemail-message-attack-vector/

Example Payload Ideas

User heads to the page to listen to their new voicemail and gets hit by malware via a drive-by-download.

User is required to sign into their gmail or O365 account prior to listening to the voicemail.

Analysis

Attackers take advantage of natural human curiosity in this pretext. While we all hate scam calls from unknown numbers, if you get a call from an unknown number and the voicemail seems intriguing, you might want to listen to it.