• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
watch out for spoofed zoom, skype, google meet sites delivering

Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware

You are here: Home / General Cyber Security News / Watch Out for Spoofed Zoom, Skype, Google Meet Sites Delivering Malware
March 7, 2024

Menace actors have been leveraging bogus internet websites promotion common online video conferencing software these types of as Google Meet up with, Skype, and Zoom to provide a wide variety of malware focusing on both of those Android and Windows people because December 2023.

“The risk actor is distributing Distant Accessibility Trojans (RATs) together with SpyNote RAT for Android platforms, and NjRAT and DCRat for Windows methods,” Zscaler ThreatLabz researchers explained.

The spoofed internet sites are in Russian and are hosted on domains that carefully resemble their genuine counterparts, indicating that the attackers are using typosquatting methods to entice possible victims into downloading the malware.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

They also arrive with alternatives to obtain the app for Android, iOS, and Windows platforms. Although clicking on the button for Android downloads an APK file, clicking on the Windows app button triggers the download of a batch script.

The malicious batch script is responsible for executing a PowerShell script, which, in switch, downloads and executes the distant obtain trojan.

At present, there is no evidence that the danger actor is concentrating on iOS users, specified that clicking on the button for the iOS application can take the person to the respectable Apple Application Store listing for Skype.

“A risk actor is employing these lures to distribute RATs for Android and Windows, which can steal private details, log keystrokes, and steal data files,” the researchers reported.

The progress will come as the AhnLab Security Intelligence Centre (ASEC) revealed that a new malware dubbed WogRAT focusing on the two Windows and Linux is abusing a no cost on the web notepad platform named aNotepad as a covert vector for hosting and retrieving destructive code.

Spoofed Zoom, Skype, Google Meet Sites

It’s reported to be active from at the very least late 2022, targeting Asian nations around the world like China, Hong Kong, Japan, and Singapore, between other people. That explained, it can be at present not regarded how the malware is dispersed in the wild.

“When WogRAT is run for the initial time, it collects standard data of the contaminated system and sends them to the C&C server,” ASEC explained. “The malware then supports commands these as executing instructions, sending success, downloading information, and uploading these documents.”

It also coincides with significant-volume phishing strategies orchestrated by a economically enthusiastic cybercriminal actor recognised as TA4903 to steal company qualifications and very likely adhere to them with business email compromise (BEC) attacks. The adversary has been active because at minimum 2019, with the pursuits intensifying write-up mid-2023.

“TA4903 routinely conducts campaigns spoofing numerous U.S. governing administration entities to steal company qualifications,” Proofpoint stated. “The actor also spoofs organizations in a variety of sectors together with construction, finance, health care, food items and beverage, and other individuals.”

Cybersecurity

Attack chains entail the use of QR codes (aka quishing) for credential phishing as well as relying on the EvilProxy adversary-in-the-center (AiTM) phishing kit to bypass two-factor authentication (2FA) protections.

After a goal mailbox is compromised, the risk actor has been noticed exploring for information and facts suitable to payments, invoices, and financial institution data, with the supreme goal of hijacking current email threads and performing bill fraud.

Phishing campaigns have also functioned as a conduit for other malware family members like DarkGate, Agent Tesla, and Remcos RAT, the final of which leverages steganographic decoys to fall the malware on compromised hosts.

Found this posting exciting? Stick to us on Twitter  and LinkedIn to go through much more unique material we article.


Some parts of this post are sourced from:
thehackernews.com

Previous Post: «hackers exploit misconfigured yarn, docker, confluence, redis servers for crypto Hackers Exploit Misconfigured YARN, Docker, Confluence, Redis Servers for Crypto Mining
Next Post: New Python-Based Snake Info Stealer Spreading Through Facebook Messages new python based snake info stealer spreading through facebook messages»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.