Saturday, March 15, 2025
HomeCyber AttackHackers Using Zoom's Popularity in Coronavirus Outbreak to Infect Computers With Malware

Hackers Using Zoom’s Popularity in Coronavirus Outbreak to Infect Computers With Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

In the current situation, most of the organization has been closed and the employees are provided with options to work from home. So the RDP and the video communication platforms usage will be high.

Zoom-bombing Attack

The number of the domain registered based on the coronavirus has already a huge uptick, since the outbreak has become more widespread.

It was observed more than 5000+ domains registered for creating infrastructure to support malicious campaigns referring to COVID-19.

Checkpoint observed a huge number of domain’s registered with the names that include “Zoom”, the Zoom is one of the biggest video communication platform used in the world.

“Since the beginning of the year, more than 1700 new domains were registered and 25% of them were registered in the past week. Out of these registered domains, 4% have been found to contain suspicious characteristics.”

Zoom is not only the target, but attackers also registered phishing domains mimic various services such as classroom[.]google.com, googloclassroom[.]com, and googieclassroom[.]com.

Also, checkpoint observed malicious files such as zoom-us-zoom_##########.exe” and “microsoft-teams_V#mu#D_##########.exe” which leads to the installation of the malware.

FBI also warned users to stay awake in the COVID-19 crisis as the video-teleconferencing (VTC) hijacking emerges.

They observed an incident in which “a Massachusetts-based high school reported that while a teacher was conducting an online class using the teleconferencing software Zoom, an unidentified individual(s) dialed into the classroom. This individual yelled profanity and then shouted the teacher’s home address in the middle of an instruction.”

Users are recommended not to make the meetings public or don’t share the meeting links in social media and make sure that your meetings have a password enabled.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

Edimax Camera RCE Vulnerability Exploited to Spread Mirai Malware

A recent alert from the Akamai Security Intelligence and Response Team (SIRT) has highlighted...

Cisco Warns of Critical IOS XR Vulnerability Enabling DoS Attacks

Cisco has issued a security advisory warning of a vulnerability in its IOS XR...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploiting Exposed Jupyter Notebooks to Deploy Cryptominers

Cado Security Labs has identified a sophisticated cryptomining campaign exploiting misconfigured Jupyter Notebooks, targeting...

AWS SNS Exploited for Data Exfiltration and Phishing Attacks

Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service...

DeepSeek R1 Jailbreaked to Create Malware, Including Keyloggers and Ransomware

The increasing popularity of generative artificial intelligence (GenAI) tools, such as OpenAI’s ChatGPT and...