Monday, November 25, 2024
HomeCyber AttackHackers Using Zoom's Popularity in Coronavirus Outbreak to Infect Computers With Malware

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Published on

Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

In the current situation, most of the organization has been closed and the employees are provided with options to work from home. So the RDP and the video communication platforms usage will be high.

Zoom-bombing Attack

The number of the domain registered based on the coronavirus has already a huge uptick, since the outbreak has become more widespread.

- Advertisement - SIEM as a Service

It was observed more than 5000+ domains registered for creating infrastructure to support malicious campaigns referring to COVID-19.

Checkpoint observed a huge number of domain’s registered with the names that include “Zoom”, the Zoom is one of the biggest video communication platform used in the world.

“Since the beginning of the year, more than 1700 new domains were registered and 25% of them were registered in the past week. Out of these registered domains, 4% have been found to contain suspicious characteristics.”

Zoom is not only the target, but attackers also registered phishing domains mimic various services such as classroom[.]google.com, googloclassroom[.]com, and googieclassroom[.]com.

Also, checkpoint observed malicious files such as zoom-us-zoom_##########.exe” and “microsoft-teams_V#mu#D_##########.exe” which leads to the installation of the malware.

FBI also warned users to stay awake in the COVID-19 crisis as the video-teleconferencing (VTC) hijacking emerges.

They observed an incident in which “a Massachusetts-based high school reported that while a teacher was conducting an online class using the teleconferencing software Zoom, an unidentified individual(s) dialed into the classroom. This individual yelled profanity and then shouted the teacher’s home address in the middle of an instruction.”

Users are recommended not to make the meetings public or don’t share the meeting links in social media and make sure that your meetings have a password enabled.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...

Earth Kasha Upgraded Their Arsenal With New Tactics To Attack Organizations

Earth Kasha, a threat actor linked to APT10, has expanded its targeting scope to...

145,000 ICS Systems, Thousands of HMIs Exposed to Cyber Attacks

Critical infrastructure, the lifeblood of modern society, is under increasing threat as a new...