Working from home? Hackers can drop malware with fake Zoom apps

Working from home? Hackers can drop malware with fake Zoom apps

Due to the coronavirus or COVID-19 outbreak, institutions, corporations, and even government offices globally have all shut down physically and depending on running things remotely. To do so, people are looking towards video communication platforms in order to seamlessly hold meetings, give lectures for a class of students and to collaborate on anything else possible.


However, with this, comes an opportunity for the bad guys to exploit video communication tools and according to the recent revelation by the IT security researchers at Checkpoint, hackers have been doing at full speed.


Presenting their findings in a blog post by the research firm today, various techniques from hackers have been observed which were and some still are being used to attack unsuspecting users of video conferencing tools especially Zoom.

Firstly, it was discovered that someone unauthorized could join a Zoom meeting in case the meeting organizer had disabled the option of a custom password required to join it.



If such was the case, only a 9-11 digit meeting ID was required. These IDs were capable of being automatically generated with the program telling you which one of these were valid and which were invalid letting one make use of the former.


See: Vulnerability expose ..

Support the originator by clicking the read the rest link below.