Zoom: Hackers take advantage of coronavirus to trap teleworkers

Since the beginning of the epidemic coronavirus and exceptional containment measures, pirates double their prowess to carry out their attacks. Think about it: Internet user behavior is changing rapidly, and its volume is focused on a few keywords that are booming on Google.

Of course, these keywords coronavirus, COVID-19, video conferencing apps that have also become extremely popular. Such is the case with Zoom. TrendMicro researchers, malicious actors Modified Zoom versions to embed malware bearing the sweet name of RevCode WebMonitor RAT.

Fake Zoom apps are coming

There are two scenarios during installation. The program detects if it is started in a virtual machine. In this case, the malicious part of the program will remain dormant. Indeed, it is in virtual machines that security researchers detect malicious programs. A way for hackers stay under the radar as much as possible.

On the other hand, if the program is running on a classic machine, a fully functional version of Zoom will be installed simultaneously with the malware. This is enough to raise as little suspicion as possible. Thus, hackers full machine accessand, for example, it can absorb keystrokes, webcam images and files.

TrendMicro points out that the attacks are only carried out through third-party sites. According to researchers, most of the infected versions of Zoom are under revision 4.6. Zoom is officially available in version 5.0 on the official website. Researchers believe most infections occur when a link is shared via email or on social apps like WhatsApp and Facebook.

The easiest way to protect yourself against this threat is to not install any apps other than the official Zoom website.

Source : TrendMicro

In relation :  5 Things to Expect from Nexus 5 Android 5.1.1
Moyens I/O Staff has motivated you, giving you tips on technology, personal development, lifestyle and strategies that will help you.