![]() It is possible that cybercriminals will also take advantage of other video conferencing apps to bundle malware. The malicious installers are significantly larger in file size compared to the legitimate Zoom installer. One of the samples installs a backdoor that allows malicious actors to run malicious routines remotely, while the other sample involves the installation of the Devil Shadow botnet in devices.įigure 1. ![]() These malicious fake installers do not come from Zoom’s official installation distribution channels. We found two malware files that pose as Zoom installers but when decoded, contains the malware code. Cybercriminals are taking advantage of “the new normal” - involving employees’ remote working conditions and the popularity of user-friendly online tools - by abusing and spoofing popular legitimate applications to infect systems with malicious routines. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |