Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    Astaroth: Banking Trojan Abusing GitHub for Resilience

    October 13, 2025

    ios – Differences in builds between Xcode 16.4 and Xcode 26

    October 13, 2025

    How to run RAG projects for better data analytics results

    October 13, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»3AM Ransomware Attackers Pose as IT Support to Compromise Networks
    IT/ Cybersecurity

    3AM Ransomware Attackers Pose as IT Support to Compromise Networks

    big tee tech hubBy big tee tech hubMay 26, 2025013 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    3AM Ransomware Attackers Pose as IT Support to Compromise Networks
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Cybercriminals are getting smarter. Not by developing new types of malware or exploiting zero-day vulnerabilities, but by simply pretending to be helpful IT support desk workers.

    Attackers affiliated with the 3AM ransomware group have combined a variety of different techniques to trick targeted employees into helping them break into networks.

    It works like this.

    First, a company employee finds their inbox bombarded with unsolicited emails within a short period of time, making it practically impossible to work effectively.

    At the same time, the attackers call the employee pretending to come from the organisation’s legitimate IT support department. Spoofed phone numbers help lend credibility to the call.

    Then, the employee answers the call. They find themselves speaking to somebody who sounds professional, offering to help fix their email issue.

    The spoof IT support desk worker, in reality a malicious hacker, tricks their intended victim into running Microsoft Quick Assist – a tool pre-installed on Windows systems – and granting remote access so the problem can be “fixed.”

    Once connected, the attackers are free to deploy their malicious payload on the employee’s PC.

    As security firm Sophos explains, a virtual machine is deployed on the compromised computer, in an attempt to evade detection from security software, and the attackers roll out a series of commands to create new user accounts and gain admin privileges.

    Sophos says it has seen cybercriminals attempt to exfiltrate hundreds of gigabytes of data in the attacks.

    The only reason attacks like these work is because workers are being duped by criminals, who are masters of social engineering, into obeying their commands (in this case, allowing the attacker to connect remotely via Microsoft Quick Assist)

    All organisations must make efforts to train staff to better defend against the wide variety of attacks that can be made against them, including social engineering tricks. Many employees may be under the misapprehension that hackers only operate via the internet and that a real-life phone call can be trusted.

    The unfortunate truth is that a phone call cannot automatically be trusted.

    In addition, IT teams would be wise to look out for unusual activity across their network (such as the exfiltration of large amounts of data), and consider disabling tools like Microsoft Quick Assist unless they are genuinely required.

    As social engineering attacks grow more sophisticated, companies must prepare for the fact that the next major breach might not start with a virus or a phishing email, but with a very convincing phone call.


    Editor’s Note: The opinions expressed in this and other guest author articles are solely those of the contributor and do not necessarily reflect those of Fortra.



    Source link

    3AM Attackers Compromise Networks Pose Ransomware Support
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Astaroth: Banking Trojan Abusing GitHub for Resilience

    October 13, 2025

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025

    Trustwave Named a Leader in the IDC MarketScape:

    October 12, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    Astaroth: Banking Trojan Abusing GitHub for Resilience

    October 13, 2025

    ios – Differences in builds between Xcode 16.4 and Xcode 26

    October 13, 2025

    How to run RAG projects for better data analytics results

    October 13, 2025

    MacBook Air deal: Save 10% Apple’s slim M4 notebook

    October 13, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    Astaroth: Banking Trojan Abusing GitHub for Resilience

    October 13, 2025

    ios – Differences in builds between Xcode 16.4 and Xcode 26

    October 13, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.