
Voicemail quishing campaign with RingCentral/Spectrum branding harvesting M365 creds via AiTM
Wrote up an active case from this week, sharing in case it helps anyone seeing similar voicemail lures.
One of our customers got hit with a quishing email branded as Spectrum Business + RingCentral + Google Voice. The bait is the usual missed-call story, "you have a voicemail about an overdue payment." Nothing remarkable so far.
The clever part is the chain. The malicious link isn't in the email body. It's in a QR code, inside a .docx attachment, inside the email. Three layers deep before anything fires.
Whole thing is designed to push the click off the corporate laptop and onto the user's phone, which is the entire point of quishing as a technique:
Once the user scans, they get a fake "Tap the box to confirm" captcha (kit-style, blocks perimeter sandboxes from following through), then a near-perfect Microsoft login page pre-filled with the victim's email pulled from the URL path. Behind it is an AiTM proxy grabbing the password and the session cookie in real time.
Full writeup with the IOCs, the captcha + AiTM screenshots, the docx internals, and some detection ideas is up on the company blog. Not posting the link inline to keep the post technical-first. I'll drop it as a comment for anyone who wants it.
Disclosure: I work at ZeroBEC