Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users

Posted on July 19, 2025July 19, 2025 By CWS

A classy phishing marketing campaign concentrating on organizations has emerged, exploiting the trusted fame of Veeam Software program via weaponized WAV audio recordsdata delivered through e mail.

The assault represents an evolution in social engineering techniques, combining conventional phishing strategies with audio-based deception to bypass typical safety measures and person consciousness coaching.

The malicious marketing campaign begins with seemingly official voicemail notifications that mimic normal VoIP system alerts when calls are missed.

Attackers craft emails containing WAV file attachments that, when opened, play recordings of people impersonating Veeam Software program representatives.

The audio message particularly references expired backup licenses, creating urgency round vital enterprise infrastructure to immediate rapid motion from recipients.

Web Storm Middle researchers recognized this marketing campaign after receiving studies from safety professionals who encountered the suspicious emails.

The assault demonstrates specific sophistication in its use of audio social engineering, as voice-based deception can usually bypass visible cues that usually alert customers to phishing makes an attempt.

The recorded message states: “Hello, that is xxxx from Veeam Software program. I’m calling you right this moment relating to your backup license which has expired this month. Would you please give me a name to debate about it?”

Audio-Primarily based Social Engineering Mechanism

The weaponized WAV recordsdata function the first assault vector, leveraging psychological manipulation via auditory channels.

Not like conventional text-based phishing, this method exploits customers’ tendency to belief voice communications, notably once they seem to originate from official software program distributors.

The attackers display broad-spectrum concentrating on, as recipients included people with no connection to Veeam environments, indicating a mass distribution technique reasonably than exact reconnaissance-based concentrating on.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Attack, File, Phishing, Themed, Users, Veeam, Wav, Weaponized

Post navigation

Previous Post: New CrushFTP 0-Day Vulnerability Exploited in the Wild to Gain Access to Servers
Next Post: Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware

Related Posts

Jingle Thief Attackers Exploiting Festive Season with Weaponized Gift Card Attacks Cyber Security News
Massive Spike in Password Attacks Targeting Cisco ASA VPN Followed by Microsoft 365 Cyber Security News
How Anat Heilper Orchestrates Breakthroughs In Silicon And Software Cyber Security News
NVIDIA Triton Vulnerability Let Attackers Trigger DoS Attack Using Malicious Payload Cyber Security News
LexisNexis Risk Solutions Data Breach Exposes 364,000 individuals personal Data Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark