{"id":95070,"date":"2021-07-29T08:00:11","date_gmt":"2021-07-29T15:00:11","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=95070"},"modified":"2023-09-11T15:47:41","modified_gmt":"2023-09-11T22:47:41","slug":"bazacall-phony-call-centers-lead-to-exfiltration-and-ransomware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/07\/29\/bazacall-phony-call-centers-lead-to-exfiltration-and-ransomware\/","title":{"rendered":"BazaCall: Phony call centers lead to exfiltration and ransomware"},"content":{"rendered":"
Our continued investigation into BazaCall campaigns, those that use fraudulent call centers that trick unsuspecting users into downloading the BazaLoader malware, shows that this threat is more dangerous than what\u2019s been discussed publicly in other security blogs and covered by the media. Apart from having backdoor capabilities, the BazaLoader payload from these campaigns also gives a remote attacker hands-on-keyboard control on an affected user\u2019s device, which allows for a fast network compromise. In our observation, attacks emanating from the BazaCall threat could move quickly within a network, conduct extensive data exfiltration and credential theft, and distribute ransomware within 48 hours of the initial compromise.<\/p>\n