• About
  • Advertise
  • Careers
  • Contact
Friday, March 31, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Beware! Hackers Are Using Zoom App To Install Spying Malware

by Cyber360 News
May 4, 2020
in Security
0
Beware! Hackers Are Using Zoom App To Install Spying Malware
0
SHARES
10
VIEWS
Share on FacebookShare on Twitter

With the Coronavirus lockdown affecting industries in their day to day functioning, video conferencing apps are making life easier for businesses.

One particular video conferencing app that achieved the pinnacle of success during the quarantine period is Zoom. But as quickly as it rose, the downfall due to persistent security reasons was equally magnificent.

Now, hackers are using the popularity of the Zoom app to target remote workers. A report by TrendMicro says that hackers are luring users into downloading the Zoom app from third-party websites, and the unofficial links are bundled with RevCode WebMonitor RAT.

WebMonitor remote access tool (RAT) creates a backdoor in your system for crooks to monitor almost anything you are doing on your PC. The RAT could be used for operations such as keylogging, capturing a screenshot, and recording video streams from a webcam to steal personal and useful information.

The report mentions that hackers are sending links via phishing email campaigns, and the RAT is installed on the target machine along with the Zoom app.

They have ensured that the RAT terminates itself if it’s executed in a virtual environment, as it involves the risk of being identified by security researchers and users.

Bundling RAT with the legit Zoom app eliminates the chances of suspicion by users, as the video recording app works flawlessly, and the monitoring software is installed covertly in the background.

However, it is noticed that hackers usually push the Zoom version 4.6 as opposed to the currently running version 5.0. This could be one of the signs for vigilant users to identify that there is something wrong with the downloaded file.

However, we recommend our readers to always install such apps from official websites and sources and refrain from using third-party app stores or websites for it.

Also, you can use Zoom alternatives if you’re not happy with the privacy and security offered by Zoom

Cyber360 News

Cyber360 News

Next Post
DHS CISA alert provides recommendations on securing Office 365 installs

DHS CISA alert provides recommendations on securing Office 365 installs

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In