Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Emerging Letscall: Advanced Voice Phishing

July 10, 2023
Reading Time: 2 mins read
in Alerts
Emerging Letscall: Advanced Voice Phishing

 

Researchers have issued a warning about an advanced form of voice phishing called “Letscall” that specifically targets individuals in South Korea. The criminals behind Letscall employ a multi-step attack, deceiving victims into downloading malicious apps from a counterfeit Google Play Store website.

Once installed, the malware redirects incoming calls to a call center controlled by the attackers, where trained operators posing as bank employees extract sensitive information.

Letscall utilizes cutting-edge technologies like voice over IP (VOIP) and WebRTC to facilitate voice traffic routing. By employing Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols, including Google STUN servers, it ensures high-quality phone or video calls and bypasses NAT and firewall restrictions. The Letscall group consists of Android developers, designers, frontend and backend developers, as well as call operators specializing in voice social engineering attacks.

The malware operates in three stages, starting with a downloader app that prepares the victim’s device for the installation of powerful spyware. This spyware enables the rerouting of incoming calls to the attackers’ call center, where the final stage occurs.

In this stage, specific commands are executed, including those related to manipulating the address book, creating and removing contacts, and creating, modifying, and removing filters that determine which calls are intercepted.

Whats sets Letscall apart is its use of advanced evasion techniques, incorporating obfuscation during the initial download and employing complex naming structures in ZIP file directories. It intentionally corrupts the manifest to confuse and bypass security systems.

Criminals have developed automated systems that call victims and play pre-recorded messages to deceive them further. By combining mobile phone infections with vishing techniques, attackers can request micro-loans in victims’ names, assuring them of suspicious activities and redirecting calls to their centers.

Although the threat is currently limited to South Korea, researchers warn that there are no technical barriers preventing the expansion of these attackers to other regions. This form of vishing attack highlights the evolving tactics of criminals and their ability to exploit technology for malicious purposes.

The Letscall group showcases intricate knowledge of Android security and voice routing technologies, underscoring the importance of vigilance and robust security measures.

Reference:
  • Letscall – new sophisticated Vishing toolset
Tags: Cyber AlertCyber Alerts 2023CyberattackCybersecurityGoogle Play StoreJuly 2023PhishingSouth Korea
ADVERTISEMENT

Related Posts

Glibc Flaw Gives Linux Root Access Risk

Mozilla Urgent Firefox Patch Fixes RCE Flaws

May 19, 2025
Fileless Remcos RAT Delivery Via LNK Files

ModiLoader Malware Targets Windows Users

May 19, 2025
Glibc Flaw Gives Linux Root Access Risk

Glibc Flaw Gives Linux Root Access Risk

May 19, 2025
Fileless Remcos RAT Delivery Via LNK Files

APT28 RoundPress Webmail Hack Steals Emails

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

Fileless Remcos RAT Delivery Via LNK Files

May 16, 2025

Latest Alerts

Mozilla Urgent Firefox Patch Fixes RCE Flaws

ModiLoader Malware Targets Windows Users

Glibc Flaw Gives Linux Root Access Risk

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Subscribe to our newsletter

    Latest Incidents

    Massive DDoS Hits Poland’s Civic Platform

    Arla Plant Cyberattack Halts Operations

    Georgia’s Harbin Clinic Hit by Data Breach

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial