Voice phishing gangs have been found to use legitimate services from Apple and Google to target unsuspecting users in elaborate scams. Recently, a cryptocurrency investor named Tony fell victim to a voice phishing attack where the scammers initially contacted him through Google Assistant and sent him emails from google.com. These scammers have been identified as part of a prolific group known as “Crypto Chameleon” who use various techniques to steal funds from their targets.
One of the key revelations from this investigation is how these voice phishing groups exploit an Apple telephone support line to send fake “account confirmation” messages to their victims. By impersonating Apple representatives and using automated systems, the scammers trick users into believing they are interacting with Apple directly. The process involves manipulating the victim’s devices to display prompts and messages that appear to be legitimate, leading them to disclose sensitive information like passwords and account details.
The mastermind behind these operations, known as “Perm” or “Annie,” runs a cybercrime community called Star Fraud, which specializes in innovative voice phishing attacks. The group uses a range of tools and services, including autodoxers, to automate the acquisition of personal data and verify potential targets before initiating a call. These tools help streamline the phishing process and ensure that the scammers target individuals with valuable assets, such as cryptocurrency holdings.
In a shocking twist, it was revealed that a phishing group linked to Perm’s panel successfully stole tens of thousands of dollars worth of cryptocurrency from billionaire Mark Cuban. Cuban admitted to falling victim to a voice phishing scam during the filming of Shark Tank, where the scammers used various tactics to gain access to his accounts and drain his funds. This incident highlights the audacity and sophistication of these criminal groups in targeting high-profile individuals.
The voice phishing community operates openly on platforms like Telegram and Discord, allowing for rapid collaboration and recruitment of new members. Despite the inherent risks of operating in such a public domain, these cybercriminals prioritize protecting themselves from internal threats rather than law enforcement. Reputation systems within these criminal networks serve as a form of self-regulation, ensuring trust and reliability among members.
Overall, the revelations about voice phishing gangs exploiting legitimate services from Apple and Google shine a light on the evolving tactics and methods used by cybercriminals to deceive and defraud unsuspecting individuals. As authorities and security firms continue to combat these threats, it is essential for users to remain vigilant and cautious when interacting with unexpected communications, especially those requesting sensitive information.

