Crypto Prices

Cybercriminals Recruit Voice Impersonators for Targeted Attacks on Crypto Executives, Reports Reveal

2 days ago
2 mins read
9 views

Emerging Cybercrime Trends

Recent cybercrime trends indicate a worrisome shift towards the recruitment of skilled voice impersonators by criminal groups, particularly aimed at U.S. cryptocurrency executives. According to a detailed report by GK8 for Decrypt, these criminals are employing advanced techniques in phone-based social engineering, referred to as “vishing,” with operatives earning impressive sums of up to $20,000 per month.

Evolution of Phishing Scams

The research highlights a significant evolution from traditional phishing scams, which typically rely on deceptive emails, to organized criminal networks that utilize personalized telephone and video communications to prey on key figures in the cryptocurrency sector. Targeting individuals responsible for crucial custody frameworks and sensitive private keys heightens the potential for substantial cryptocurrency theft, threatening the ecosystem’s overall security.

Recruitment of Voice Impersonators

In a development noted in June, researchers from GK8 identified multiple recruitment advertisements on obscure online forums. Here, established cybercriminals sought out adept voice impersonators — dubbed “callers” — for targeting high-ranking personnel within prominent U.S. crypto companies. The posts often included meticulously crafted target lists featuring five specific executives, such as senior legal advisors and chief technology officers, all with considerable net worth often exceeding $500,000.

“Through careful analysis of their online presence, we were able to vet the reputability of these threat actors including their ratings and accounts’ history,” said Tanya Bekker, GK8’s Head of Research, discussing the investigative methods used to authenticate these underground operations.

She further noted that the data leveraged by these campaigns often stems from newly acquired compromises, lending credibility to their targeting.

Refined Vishing Campaigns

Unlike standard phishing attacks that are less personalized, this new breed of vishing campaigns is exceptionally refined, concentrating on high-risk targets in the cryptocurrency realm. Bekker elaborated on how attackers utilize impersonation tactics, combining voice and video fraud as well as deepfake technology, all designed around comprehensive victim profiles.

Utilizing Voice over Internet Protocol (VoIP) systems along with dedicated dialing numbers, these criminal enterprises can imitate legitimate entities such as banks and government agencies, further complicating detection efforts. The report cites that operators can earn anywhere between $15 for a brief call to over $20,000 monthly, illustrating the lucrative nature of this illicit trade.

“We’ve observed some individuals forming long-standing collaborations, mimicking a structured industry dedicated solely to fraud,” Bekker remarked, underlining the seriousness with which these criminals approach their activities.

Global Cyber Threats

Notably, as cyber threats scale globally, similar operations are reportedly prevalent in countries such as Germany, the UK, and Australia. The report correlates the rise in social engineering incidents to broader, organized attempts by state-funded actors, like North Korea, who have employed deepfake videos in job interviews with the goal of infiltrating crypto firms. Recent statistics indicate that such groups have successfully pilfered approximately $1.34 billion through 47 separate unauthorized incidents within the year.

Binance’s Chief Security Officer Jimmy Su has previously indicated that the exchange faces daily challenges from cryptographic scams, with counterfeit resumes often linked to suspected North Korean operatives using voice modulation technology during interviews. He suggests that detection primarily relies on identifying tell-tale signs such as poor internet connectivity during their calls, which is frequently a side effect of the technologies utilized.

Recommendations for Cryptocurrency Firms

The GK8 report accentuates an emerging paradigm among threat actors who now prefer depth over breadth, tailoring their attacks to maximize effectiveness over sheer numbers. Looking ahead, Bekker warns that as these tactics become more sophisticated, distinguishing between genuine and fabricated communications will grow increasingly contentious. She urges cryptocurrency firms to bolster their defenses against these customized attacks by instituting strict security protocols and training focused on voice and video social engineering tactics.

“Given the growing trend of personalized scams, it is pivotal for companies to operate under the assumption that their sensitive data has been compromised and to segregate responsibilities concerning high-value transactions to mitigate risk,” Bekker stressed.

Moreover, the report highlights that specific operational criteria for recruitment of voice impersonators include accent preferences, gender preferences, and multilingual abilities, all aimed at enhancing the likelihood of successfully engaging victims during optimal calling hours.