Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Zoom Phishing Attacks: A Method for Scammers

Video conferencing applications like Zoom became a popular medium for daily meetings to discuss plans of action and everyday work developments. Nowadays, Zoom Phishing Attacks became a new source for scammers to steal data.

The popularity of Zoom has also turned into one of the cyber criminals’ most lucrative tools for exploiting innocent individuals. Scammers have been using emails to trap their victims using the name of this app to launch Phishing Attacks on unsuspecting users. 

Get in!

Join our weekly newsletter and get the latest cybersecurity updates delivered directly to your inbox

Zoom Phishing Attacks Use its Name

The victims receive emails saying that Zoom has undergone a server upgrade, prompting them to verify their account if they want to continue making or receiving calls through this app.

Zoom Phishing Attacks Email Format (Source: Bleeping Computer)

The display name in the email headers shows “Zoom – no-reply@zoom[.]us”. This makes it appear as if it is genuinely from Zoom. 

Along with this, most of the email domains used came from legitimate but compromised accounts. Additionally, some phishing emails also used new email domain names such as zoomcommunications[.]com or zoomvideoconference[.]com. It is very difficult for Secure Email Gateways (SEGs) to catch them due to the legitimacy attached to the domain names used by these threat actors.

Credential Harvesting is Their Aim in Zoom Phishing Attacks

These zoom phishing attacks aim to steal credentials from services like Outlook and Office 365 by directing the user to spoofed login pages. Moreover, the attackers are even using techniques like obfuscation to make it very difficult for security systems to detect phishing pages.

Hackers use a fake attachment that leads to a login page that is locally hosted on the recipient’s computer and not on the internet. Further, the HTML, JavaScript, and PHP code is encoded. This is unreadable to humans and automated security tools. This is done to bypass URL reputation checkers and remain undetected.

Similarly, hackers use a malicious link to redirect the victims to a fake login page that is hosted on a compromised server. The spoofed websites or email spoofing look very identical to the legitimate pages of Outlook and Microsoft Office 365. Therefore, it’s very easy for the victim to fall prey to it.

In a Tom’s Guide article, they have researched and mentioned the problems Zoom has been experiencing in past. An expert review of its security and privacy practices revealed some concerning findings. Like Zoom’s end-to-end encryption was not quite that. Other Zoom meeting participants could learn a lot about you. Pranksters and bored teenagers could, and occasionally still do, “Zoom bomb” public meetings with shocking or rude content.

Since the early summer of 2020, most of those imperfections have now been fixed or mitigated, but newer issues have arisen on occasion.

Recent Zoom Phishing Attack

Researchers revealed a zoom phishing attack on a major North American online brokerage company on 25 August 2022, in which a victim begins a legitimate Zoom session only to have their Microsoft credentials hijacked after landing on a fake Microsoft Outlook log-in screen.

A study found that email attacks clone workflows that are used by most people every day. In most organizations, Zoom has been used all the time. It’s like a daily routine for employees to click on start meeting. Especially since Zoom’s emails all have similar content and most users are used to them.

Phishing attacks rose 220 percent during the height of the Covid-19 pandemic compared to the yearly average

– Gulf Business

How Can You Identify a Zoom Phishing Attacks

Phishing attacks have evolved and have become even more complex to differentiate from legitimate emails. The cost of recovery from a successful phishing attack that results in credential harvesting can be huge. Some measures to detect zoom phishing attacks are mentioned below:

Check the email domain name 

You should check the name and email address of the sender very carefully. The domain name of a legitimate sender would look like abc@company[.]com. However, a phishing email would contain a sender id which would say abc@commpany[.]com or abc@companny[.]com. 

Be wary of requests for sensitive information

The purpose of zoom phishing attacks is to harvest sensitive information from the victims. A legitimate email would never ask you to send such information through email. Therefore, this is a major red flag when it comes to detecting phishing emails.

Check the content of the email

Typically, a phishing email would contain numerous spelling mistakes and grammatical errors. Legitimate emails from companies will never contain such mistakes as they have dedicated teams of employees who write emails on their behalf. It’s better to check for the genuineness of the sender if the email body contains any spelling mistakes or grammatical errors.

Check for suspicious links

Zoom phishing emails come with a gateway. It can be in the form of redirection to a fake website or an attachment that needs to be downloaded. Genuine companies never ask you to download any such attachments or click any such links.

Check for free offers or coupons

Phishing emails usually contain offers that sound very attractive. The objective is to make the victim click on the link for availing of the offer. This starts the process of redirecting the victims to a bogus website or getting them to download a malicious attachment. 

Measures to Prevent Zoom Phishing Attacks

Threat actors have found ways to evade the barriers of spam filters and land their phishing emails in the inboxes of recipients. Some ways to prevent zoom phishing attacks are mentioned below:

  1. Use awareness training tools like TSAT for creating employee security awareness training. Moreover, this tool can provide the organization with handy information about the status of their employees in terms of cyber vulnerability. Along with this, it also provides employees with useful awareness training at the end of the campaign.
  2. Use Multi-Factor Authentication (MFA) to add an extra layer of protection. This can enhance the security of sensitive information. Moreover, MFA is a very user-friendly defense mechanism for the end-user. Along with this, MFA comes with Single-Sign-On (SSO) solution. It helps in the prevention of losing data due to password misplacement.
  3. Use Phishing Incident Response Tools like TPIR to secure the organization from emails from suspicious domains in the future. You can report the email and it will send it to the trash. It removes reported malicious emails directly from the user’s inbox.
  4. Encrypt all the sensitive information possessed by the organization about clients and their systems.
  5. Implement DMARC like TDMARC to secure your domain against forgery and misuse. Limiting phishing attacks that use your organization’s domain can save the organization’s reputation and client relationships.
  6. Conduct VAPT to test the organization for vulnerabilities and upgrade the systems accordingly to satisfy the standard of cyber security required.

“If you’re proactive, you focus on preparing. If you’re reactive, you end up focusing on repairing.”

– John C Maxwell

Malicious actors are now equipped with newer technology and methods to carry out zoom phishing attacks. However, if people are careful and smart enough to spot such emails, the damage from these attacks can be prevented. 

The post Zoom Phishing Attacks: A Method for Scammers first appeared on Threatcop.



This post first appeared on ThreatCop-Latest Cyber Security Blogs, News, And Updates, please read the originial post: here

Share the post

Zoom Phishing Attacks: A Method for Scammers

×

Subscribe to Threatcop-latest Cyber Security Blogs, News, And Updates

Get updates delivered right to your inbox!

Thank you for your subscription

×