Business
Focused
Technology

Fake Zoom Downloader is the Latest Method of Attack on Remote Workers

Riding on the coattails of the massive rise in popularity in the video conference solution, remote workers new to Zoom need to be wary of where they download the installer.

We’ve written before about the various types of Zoom-related attacks that have sprouted up over the last two months. The latest chapter in this saga involves an actual Zoom installer laden with backdoor malware. Available on malicious third-party sites (and not from Zoom’s official website), these installers are offered up using phishing emails and spam campaigns designed to direct potential victims to these alternative installers.

The compromised installer does deliver an installation of Zoom, but also installs the remote access trojan (RAT) WebMonitor, giving attackers remote access to an infected endpoint via a web browser.

This kind of attack isn’t new, but the rise in necessity and popularity of video conferencing solutions makes Zoom the perfect brand to leverage.

To avoid becoming a victim, the simple answer here is to train users to do two things:

Users undergoing Security Awareness Training already understand the importance of these two simple best practices. But with so many other types of attacks that seek to trick users into participating, it’s important for users to be continually educated to ensure they don’t make these small understandable mistakes with huge ramifications.


SOURCE: KnowBe4

Principal Owner, Law Firm

Our law firm uses IT360, Inc. for all of our technology needs. They not only provide outstanding service at a reasonable fee, but we consider them an integral part of our practice.

Principal Owner, Law Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more