Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Emerging Letscall: Advanced Voice Phishing

July 10, 2023
Reading Time: 2 mins read
in Alerts
Emerging Letscall: Advanced Voice Phishing

 

Researchers have issued a warning about an advanced form of voice phishing called “Letscall” that specifically targets individuals in South Korea. The criminals behind Letscall employ a multi-step attack, deceiving victims into downloading malicious apps from a counterfeit Google Play Store website.

Once installed, the malware redirects incoming calls to a call center controlled by the attackers, where trained operators posing as bank employees extract sensitive information.

Letscall utilizes cutting-edge technologies like voice over IP (VOIP) and WebRTC to facilitate voice traffic routing. By employing Session Traversal Utilities for NAT (STUN) and Traversal Using Relays around NAT (TURN) protocols, including Google STUN servers, it ensures high-quality phone or video calls and bypasses NAT and firewall restrictions. The Letscall group consists of Android developers, designers, frontend and backend developers, as well as call operators specializing in voice social engineering attacks.

The malware operates in three stages, starting with a downloader app that prepares the victim’s device for the installation of powerful spyware. This spyware enables the rerouting of incoming calls to the attackers’ call center, where the final stage occurs.

In this stage, specific commands are executed, including those related to manipulating the address book, creating and removing contacts, and creating, modifying, and removing filters that determine which calls are intercepted.

Whats sets Letscall apart is its use of advanced evasion techniques, incorporating obfuscation during the initial download and employing complex naming structures in ZIP file directories. It intentionally corrupts the manifest to confuse and bypass security systems.

Criminals have developed automated systems that call victims and play pre-recorded messages to deceive them further. By combining mobile phone infections with vishing techniques, attackers can request micro-loans in victims’ names, assuring them of suspicious activities and redirecting calls to their centers.

Although the threat is currently limited to South Korea, researchers warn that there are no technical barriers preventing the expansion of these attackers to other regions. This form of vishing attack highlights the evolving tactics of criminals and their ability to exploit technology for malicious purposes.

The Letscall group showcases intricate knowledge of Android security and voice routing technologies, underscoring the importance of vigilance and robust security measures.

Reference:
  • Letscall – new sophisticated Vishing toolset
Tags: Cyber AlertCyber Alerts 2023CyberattackCybersecurityGoogle Play StoreJuly 2023PhishingSouth Korea
ADVERTISEMENT

Related Posts

Water Curse Group Hits Developers Via GitHub

Water Curse Group Hits Developers Via GitHub

June 17, 2025
Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

June 17, 2025
Water Curse Group Hits Developers Via GitHub

CISA Warns Of Apple Zero Click Exploit

June 17, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

PyPI Malware Steals AWS, CI/CD, macOS Data

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

Image Hiding in DNS TXT Records

June 16, 2025
PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

June 16, 2025

Latest Alerts

Water Curse Group Hits Developers Via GitHub

XDSpy Exploits Windows LNK Zero Day

CISA Warns Of Apple Zero Click Exploit

PyPI Malware Steals AWS, CI/CD, macOS Data

IBM Backup Service Flaw Allows Elevated Access

Image Hiding in DNS TXT Records

Subscribe to our newsletter

    Latest Incidents

    Zoomcar Data Breach Hits 8.4 Million Users

    Qilin Gang Leaks Asefa FC Barcelona Data

    Gunra Claims 45TB Hack On Colombia Justice

    Hackers Leak 10K VirtualMacOSX Customer Data

    Canada WestJet Airline Contains Cyberattack

    Washington Post Investigates Cyberattack on Emails

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial