Cybercriminals Exploit Multimedia Files in Sophisticated Vishing Attacks

In early 2025, cybersecurity researchers identified a novel vishing (voice phishing) campaign where cybercriminals utilize multimedia file formats to bypass security systems and deceive victims. This evolution in social engineering tactics involves embedding fraudulent messages within commonly trusted file formats, prompting recipients to call fake customer support numbers.

Attack Methodology

The attack typically begins with an email containing minimal content, designed to pique the recipient’s curiosity or create a sense of urgency. These emails often include attachments in multimedia formats such as MP4 videos or WebP images. Upon opening, the attachments display fake invoices or payment notifications, frequently impersonating reputable financial services like PayPal. The messages claim unauthorized charges have been made and urge the recipient to call a provided phone number within a short timeframe, usually 24 hours.

This multi-stage approach leverages psychological manipulation:

1. Curiosity Induction: The vague email content compels the recipient to open the attachment.

2. Panic Creation: The fraudulent message within the attachment instills fear of unauthorized financial activity.

3. High-Pressure Tactics: During the phone call, attackers employ social engineering techniques to extract sensitive information from the victim.

According to Trellix researchers, approximately 79% of these attacks impersonate PayPal services, with the remainder masquerading as technical support services or using generic financial themes.

Detection Evasion Techniques

A key factor in the effectiveness of these attacks is their ability to evade detection. By using MP4 and WebP file formats, which are typically considered low-risk by security systems, attackers can bypass traditional email security measures. These multimedia files often contain static images with fake payment information rather than actual multimedia content, allowing them to retain their extensions while functioning as documents. This creates a detection blind spot in many security systems.

Recommendations for Mitigation

To defend against these sophisticated vishing attacks, organizations should:

– Enhance Email Filtering: Configure email security solutions to scrutinize multimedia attachments, especially those associated with financial themes or sent from free email services.

– Implement Security Awareness Training: Educate employees about emerging social engineering techniques and the risks associated with opening unsolicited multimedia attachments.

– Verify Communications: Encourage individuals to verify the authenticity of communications by contacting organizations through official channels rather than using contact information provided in unsolicited messages.

By adopting these measures, organizations can better protect themselves and their employees from falling victim to these advanced vishing attacks.