At least three cybercriminal groups, oblivious to each other, have started using Conti ransomware for their BazarCall phishing tactics. This cyberattack method has become the main one they use to gain access to their victims’ network. The BazarCall method is also known as the callback scam, which was detected in early 2021. Previously, used the Ryuz ransomware for their criminal operations, but this has changed its name to Conti. The data ‘hijacking’ virus is difficult to detect and stop due to social engineering. Most of the time, attackers target these cybercrimes at company or agency workers. What is a callback scam? First of all, cybercriminals usually send an email about a supposed subscription that the user is paying for. The message falsely details that it is about to be automatically renewed and that, if you want to cancel, the recipient must call a specific number. Those who fall into the trap and call the number provided in the email are actually calling the attacker who tells with social engineering. The cybercriminal convinces the victim to log in remote access through legitimate software that does not suspect the victim’s true intentions. While the scammer distracts the victim, he commits the web of her. At the moment, three groups of cybercriminals are known to use Conti to perform the BazarCall method or a similar version: Silent Ransom Group, Quantum, and Roy/Zeon. Sign up for our newsletter and receive the latest technology news in your email.