The Rise of Phantom Cyber Firms: How to Spot Them and What to Verify Before you Engage
LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP. Learn More
Get access to immediate incident response assistance.
Get access to immediate incident response assistance.
LevelBlue Completes Acquisition of Trustwave to Form the World's Largest Pure-Play MSSP. Learn More
It’s bad enough that organizations must worry about threat actors launching phishing attacks, injecting ransomware, or exploiting vulnerabilities; now, there is a new attack variant on the loose. Legal scammers.
These are companies, which seem to be emerging particularly in Australia, are set up and registered as a legal cybersecurity firm, but in the end just take a company’s money without delivering any services.
Over the last few years, I have repeatedly encountered the same playbook being used: a polished cybersecurity business appears out of nowhere.
It has a legitimate Australian Business Number (ABN), a slick website, a handful of convincing LinkedIn profiles, and a stream of topical articles (increasingly AI-assisted) about current breaches.
These are not your run-of-the-mill adversaries, but are highly sophisticated groups that, after a patient period of building credibility, contact organizations claiming to have “found your data on the dark web” or “identified critical vulnerabilities,” and apply pressure to set up an urgent call.
The scammer’s approach is deliberate. They create the façade of legitimacy, then add an emotional lever —usually fear —which is a very effective mechanism for persuading rushed decision-makers to pay for “help” they have not independently validated.
This is not theoretical. The techniques combine tried-and-tested social engineering practices with modern tools (automated content, purchased domain names, realistic but fake LinkedIn personas).
The aim is not always to deliver genuine technical value; often, it is to create sufficient doubt and urgency that a target pays for remediation, removal, or “safe-keeping” of data.
The defensive response is simple in concept but must be practiced: pause, verify, demand evidence, and channel the contact through your incident response, legal and procurement processes.
Below I set out the practical checks that every CISO, CIO and procurement lead should require before accepting unsolicited security claims — and a short “how to verify us” checklist at the end so you know exactly where to look if we (or any other provider) reach out.
Here is a short list of authoritative places (and how to use them)
Grant Hutchons is APAC Director for Managed Security Services Engineering at Trustwave. He specializes in Managed Detection and Response and targeted Co-Managed SOC solutions, helping organizations in healthcare, education, and government sectors enhance their cybersecurity posture. Follow Grant on LinkedIn.
Trustwave, A LevelBlue Company, is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.
Copyright © 2025 Trustwave Holdings, Inc. All rights reserved.