Home » » COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware

As people progress from online platforms and communications such as Zoom, becoming more popular after the outbreak of coronavirus, they are increasingly forced to use the registry of new fake Zoom domains. and Zoom's malicious actions in an attempt to get people to remove malicious software on their devices.

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware


According to a report by Check Point that The Hacker News already distributes, more than 1,700 new Zoom zones have been registered since the deadly virus, with 25 percent of them registered within seven days. they are gone.

"We are seeing a significant increase in the number of Zoom zones being registered, especially over the last week," said Omer Debinski, an online research director at Check Point.
"The rise of modernization has led the hackers to embrace the COVID-19 paradigm from work back home, and see it as an opportunity to cheat, understand and use. you get the Zoom link, or any article that was sent to you or sent to you and I will check it to make sure it is not a trap. "
With over 74,000 customers and 13 million monthly active users, Zoom is one of the most popular cloud-based communication platforms that offers chat, video and audio conferencing, as well as websites and virtual meetings.
Zoom has grown in popularity in recent weeks as students, business people and public servants around the world are encouraged to work and communicate from home at home. timing of coronavirus infection.

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware


The report was released after a massive surge in several regions linked to malignant coronaviruses as insurgents discover new ways to benefit from the global health crisis by transporting from numerous attacks, propaganda campaigns, and the creation of corrupt websites and malicious activities.
Also, the researchers said they found a malicious file labeled "zoom-us-zoom _ ###########". Use "to install unwanted computer systems (PUP), such as InstallCore, a simple batch application known to integrate with other types of malicious software.
But Zoom is the only application for cybercriminals. College researchers say schools that are turning to online learning platforms to engage students have identified access points referred to as Google Classroom websites (such as googloclassroom \ .com and googieclassroom \ .com) to drag them inside. users take abuse.
Zoom adjusts the privacy of the iOS app

As for its Zoom platform, it also has its own range of security and security features. Last year, a vulnerable application was launched on a video computer system that allowed websites to capture users' web content and "powerfully" connect them to Zoom phones without their permission.
Then, in early January of this year, the company fixed a bug that would allow hackers to suspend meeting IDs or participate in a shooting session, by launching special audio, video and text access throughout the season. After opening, Zoom will enter the default passwords for each meeting, and participants will need to log in and log in to the meeting ID.

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware


And finally, over the weekend, Zoom updated its iOS app after it caught posting a toolbar with a unique Advertiser ID on Facebook using a computerized software package (SDK). , and is afraid that it may not be possible to disclose data in its privacy policy.
Understanding some of the privacy concerns associated with the use of Zoom products, the Electronic Frontier Foundation (EFF) said by noting that Zoom is aware of or calling because Zoom is active or active. video callers to make sure they're listening. Managers can also see each participant's IP address, location, and device information.

To protect yourself from such threats, it is important to update your requests and seek emails from unknown suppliers and similar domains that may have typographical errors.
Also, do not open unrecognized attachments and do not resort to promotional links in emails, remedies from Corona do not appear via email, and you guarantee the release of the content derived from reliable sources only.
Anything to say about this article? Leave a comment below and share it with us on Facebook, Twitter or our LinkedIn groups.

COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware

0 comments:

Post a Comment

We love comments! We appreciate your queries but to protect from being spammed, all comments will be moderated by our human moderators. Read our full comment policy here.
Let's enjoy a happy and meaningful conversation ahead!

 
Copyright © By JAAMOL