Friday, April 23, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

Cyber criminals are trying a new trick to cash in on Zoom’s popularity

April 7, 2020
in Internet Security
Cyber criminals are trying a new trick to cash in on Zoom’s popularity
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Cyber criminals are bundling malware inside installers of video conferencing application Zoom in an effort to lure victims into unwittingly infecting their computers with malicious software.

As the coronavirus outbreak forces organisations around the world to shift towards remote working, Zoom has become the top choice of video conferencing software for people – both when it comes to work and socialising.

You might also like

King Island connectivity upgrade to include 110km radio link across Bass Strait

Malware and ransomware gangs have found this new way to cover their tracks

Best free PC antivirus software in 2021

However, Zoom’s sudden growth in popularity has also drawn the attention of criminals who have now focused on trying to trick users whether that’s through phishing attacks, attempting to stealing credentials and other online theft.

Now researchers at Trend Micro have uncovered cyber criminals looking to exploit Zoom by bundling cryptocurrency mining malware inside a legitimate installer for the video conferencing software.

“The sudden need to transition to a work-from-home setup left enterprises with little time to ramp up security measures to ensure that it fits the requirements demanded by remote work,” the security company said.

SEE: Coronavirus: Effective strategies and tools for remote work during a pandemic

The trojan horse Zoom downloads don’t come from any official sources, but rather third party fraudulent websites which are attempting to take advantage of the popularity of Zoom.

While these downloads will install a functional version of Zoom – which helps to avoid any suspicion from the user – it also secretly places a coin miner on the machine. It also collects information about the computer’s GPU, CPU, operating system, video controllers and processors to help the mining process along.

Coin mining malware allows the attackers to use the processing power of infected computers to help mine for cryptocurrency, with the idea that the process goes on in the background so as to avoid detection – although aggressive coin mining can result in slowing the system down and even potential damage by overheating it.

The cryptocurrency generated by a single machine won’t amount to much, but by infecting a large number of computers with cryptojacking malware and having it remain undetected over a long period of time, it can potentially generate a reasonable sum of cryptocurrency for the attackers.

SEE: Cybersecurity: Let’s get tactical (ZDNet/TechRepublic special feature) | Download the free PDF version (TechRepublic)  

In this case, the malware attempts to avoid detection by checking to see if common antivirus software is on the machine and the coin miner will avoid running if these and certainother system processes are actively being used on the computer.

Trend Micro has informed Zoom about the malicious Zoom installers. ZDNet has attempted to contact Zoom but at the time of writing hasn’t received a response.

To avoid falling to this coinmining malware campaign – or any other scheme designed to take advantage of the rise in home working – users are urged to only download installers from applications’ official websites.

“Users should be advised to only download installers from applications’ official websites to avoid such compromise. Users should also follow best practices for securing work-from-home setups and be running an up to date anti-malware prevention checking tool,” said Ian Heritage, cloud security architect at Trend Micro.

READ MORE ON CYBER SECURITY

Credit: Zdnet

Previous Post

General Motors applies for blockchain map patent

Next Post

Soapbox: The best way to serve your audience? Use empathy

Related Posts

King Island connectivity upgrade to include 110km radio link across Bass Strait
Internet Security

King Island connectivity upgrade to include 110km radio link across Bass Strait

April 23, 2021
Malware and ransomware gangs have found this new way to cover their tracks
Internet Security

Malware and ransomware gangs have found this new way to cover their tracks

April 23, 2021
Best free PC antivirus software in 2021
Internet Security

Best free PC antivirus software in 2021

April 23, 2021
ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation
Internet Security

ServiceNow launches unified agent platform, aims to meld diagnostics with incident automation

April 23, 2021
SolarWinds hack analysis reveals 56% boost in command server footprint
Internet Security

SolarWinds hack analysis reveals 56% boost in command server footprint

April 22, 2021
Next Post
Soapbox: The best way to serve your audience? Use empathy

Soapbox: The best way to serve your audience? Use empathy

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Edge Computing, The Cloud, And AI Autonomous Vehicles 
Artificial Intelligence

Edge Computing, The Cloud, And AI Autonomous Vehicles 

April 23, 2021
Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU
Machine Learning

Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU

April 23, 2021
King Island connectivity upgrade to include 110km radio link across Bass Strait
Internet Security

King Island connectivity upgrade to include 110km radio link across Bass Strait

April 23, 2021
IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future
Data Science

IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future

April 23, 2021
Your Doctor’s Assistant is AI 
Artificial Intelligence

Your Doctor’s Assistant is AI 

April 23, 2021
Machine learning model generates realistic seismic waveforms
Machine Learning

Machine learning model generates realistic seismic waveforms

April 23, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Edge Computing, The Cloud, And AI Autonomous Vehicles  April 23, 2021
  • Data Science and Machine-Learning Platforms Market 2020 | Latest Trends, Demand, Growth, Opportunities & Outlook Till 2027 | Top Key Players: SAS, Alteryx, IBM, RapidM – KSU April 23, 2021
  • King Island connectivity upgrade to include 110km radio link across Bass Strait April 23, 2021
  • IoT in Telecommunications: Challenges, Opportunities, Benefits & The Future April 23, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates