Video Conferencing Method That Hackers Turn Coronavirus Into Opportunity2 min read

Zoombombing

In a report shared by cyber security firm Check Point Research, hackers’ new target was reported to be using video conferencing. The report states that malware is hidden in such video conferencing links.

The demand for platforms such as Zoom and Microsoft Teams has increased considerably these days when millions of people could not go to their jobs due to coronavirus quarantines and had to close their homes. As such, hackers have begun targeting users using video conferencing software used by millions of people.

A report shared by cyber security firm Check Point Research reports that hackers have registered a significant number of domains related to Zoom, Microsoft Teams and Google Meet software. At this point, the company says that 2,449 domains related to Zoom have been registered in the last three weeks only, 32 of them are malicious and 320 are suspicious.

Fake links are placed inside emails:

Such malicious domains can be used in phishing attacks designed to steal personal information or target a user’s computer. At this point, the researchers found such a field in a phishing email that allegedly came from Microsoft Teams. If this link was clicked, the user would have mistakenly downloaded the malware.

The report also discussed the methods hackers have recently put forward, suggesting healthcare facilities. In one example, there was an email allegedly sent by the World Health Organization (WHO), which contained malicious links. In addition, it is stated in the e-mails that users are asked to donate to the WHO and the United Nations.

Hackers do not seem to be the only problem for popular video conferencing software. At this point, the fact that online trolls called “Zoombombing” undesirably entered a video conference call, has recently become widespread on Zoom. After what happened, the company started to spend more work to increase security measures.

+1
0
+1
0
+1
0
+1
0
+1
0
+1
0
+1
0

Leave a Reply

Your email address will not be published. Required fields are marked *