Monday, February 24, 2025
HomeCyber AttackBeware Of New Phishing Attack That Mimics ScreenConnect And Zoom

Beware Of New Phishing Attack That Mimics ScreenConnect And Zoom

Published on

SIEM as a Service

Follow Us on Google News

Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.

Cyble Research & Intelligence Labs (CRIL) has uncovered a sophisticated phishing operation targeting Zoom users. 

The scheme utilizes a fraudulent portal that looks like Zoom’s website to attract the victims to download a remote access software called ScreenConnect.

After the installation, ScreenConnect is automatically able to connect to an unauthorized domain without the knowledge of the victim.

Such a breach provides the attackers with the ability to remotely control the affected machines and commit malicious activities.

Technical Analysis

The domain linked with the ScreenConnect installation resolves into an IP address that equally hosts another domain related to SSA account fraud activity.

This connection, highlighted by a Facebook user’s post, reveals a shared infrastructure used for multiple scams targeting diverse groups, indicating a broader, multi-faceted fraudulent operation.

Social media post reporting support scam (Source – Cyble) 

An example of such a cyber threat is the Zoom phishing site that is visually portrayed in the figure that accompanies this text.

Using social engineering tactics, threat actors design phishing schemes aimed at controlling their targets to willingly give up the system.

Phishing site (Source – Cyble)

It normally starts with a false message purportedly from reliable companies like Amazon, PayPal, or an official government body.

They are forced to use compromised infrastructure such as calling targeted fake support numbers or going to fake websites.

They later used even this level of engagement to ensure the victims would install remote access software, mainly ScreenConnect (now known as ConnectWise Control).

The software upon execution establishes a connection to its command and control (C2) server that enables the perpetrator to take control over the victim machine with all its programs.

The malware deployment process often involves sophisticated obfuscation techniques, including the use of signed binaries and sequential installation.

For instance, a campaign used Zoom Zoom-based phishing site to deploy malware with a function of the binary named Private-Meeting.ClientSetup.exe which also contained several layered PE files.

This dependency would unpackage and execute an MSI silently using a stolen digital signature so that it appears legit.

After favorable conditions are met when the ScreenConnect client is launched, it would connect to a hard-coded command and control server like “poyttwq.zapto.org” on port 8041.

With this access, the attackers then choose to use it for their advantage by accessing or controlling the victims’ financial accounts, initiating fraudulent transactions, or forcing victims into transferring funds under various pretexts.

A specific type of this scam, analyzed within a CISA advisory, involved the impersonation of Geek Squad and resulted in great financial losses through fake refund overpayments.

The infrastructure supporting these operations is most of the time put into multi-fraud operations as in this case where the C2 server has other suspicious sites like “railindiaticket[.]in” which was used in SSA impersonators scams.

The latter approach is sometimes described as “pig butchering,’ where over time the aim is to take down the victims’ resources in a systematic way using persistence and abuse of personal details.

Recommendations

Here below we have mentioned all the recommendations:-

  • SSA uses official channels only.
  • Avoid links and sharing info from suspicious messages.
  • Confirm legitimacy by contacting SSA directly.
  • SSA never asks for software downloads.
  • Verify URLs are official SSA.

Download FreeIncident Response Plan Templatefor Your Security Team – Free Download

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

GitVenom Campaign Abuses Thousands of GitHub Repositories to Infect Users

The GitVenom campaign, a sophisticated cyber threat, has been exploiting GitHub repositories to spread...

UAC-0212: Hackers Unleash Devastating Cyber Assault on Critical Infrastructure

In a recent escalation of cyber threats, hackers have launched a targeted campaign, identified...

Widespread Chrome Malware: 16 Extensions Infect Over 3.2 Million Users

A recent cybersecurity investigation has uncovered a cluster of 16 malicious Chrome extensions that...

Sliver C2 Server Vulnerability Enables TCP Hijacking for Traffic Interception

A significant vulnerability has been discovered in the Sliver C2 server, a popular open-source...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Industrial Organizations Under Siege: Chinese Hackers Wield Advanced FatalRAT Malware

A recent investigation by Kaspersky ICS CERT has uncovered a sophisticated cyberattack targeting industrial...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

Fake ChatGPT Premium Phishing Scam Spreads to Steal User Credentials

A sophisticated phishing campaign impersonating OpenAI’s ChatGPT Premium subscription service has surged globally, targeting...