The application of video Zoom happens, as the saying goes, you are growing the dwarf. No one would have imagined two weeks ago, when added users per million at a global level thanks to the boom in telecommuting to the cause of the crisis of the coronavirus.
But since then have not done more to happen in several controversies relating to vulnerabilities and lack of privacy of this software: potential transfer of private data to China, the absence of encryption end-to-endwatch the participants of the meetings, etc, etc
And now, if all this outside little, the cybercriminals begin to take advantage of the notoriety garnered by Zoom to impersonate that company and achieve and disseminate various kinds of malware.
The unlucky star Zoom
They achieve this by spreading legitimate versions of Zoom accompanied by installer programs that take advantage to ‘sneak’ into the computers of their victims malware as remote access trojans and even –according to have been disseminated by TrendMicro– software mining criptodivisas.
In this latter case, once installed this malware begins to undermine the criptodivisa Monero using the calculation capacity of the CPU and the GPU on the infected computer, which slows down its operation and overheat your hardware.
In other cases, the Zoom comes ‘accompanied’ of a trojan named njRAT or Bladabindithat gives the attacker full access to the computer, allowing -for example – capture images from the webcam or run any type of command.
The integrity of the installers of Zoom that offers its official website has not been compromised, so that everything indicates that there have been fraudulent websites that have been put in circulation these files malicious.
Until now, both the trojan as the ‘coinminer’ seem to be affecting only Windows 64-bit computers. If that is your case, the third best way to avoid being a victim of this malware is to have installed some anti-malware programs with real time protection enabled.
The second is to rely only on files that you download from the official website. And the first is, of course, opt for any alternative to the Zoom that counts in addition with a higher level of privacy protection.
Via | BleepingComputer
Cybercriminals use Zoom to disseminate installers program full of malware
it was originally published in