Categories: NewsTechWindows

Cybercriminals use Zoom to disseminate installers program full of malware

The application of video Zoom happens, as the saying goes, you are growing the dwarf. No one would have imagined two weeks ago, when added users per million at a global level thanks to the boom in telecommuting to the cause of the crisis of the coronavirus.

But since then have not done more to happen in several controversies relating to vulnerabilities and lack of privacy of this software: potential transfer of private data to China, the absence of encryption end-to-endwatch the participants of the meetings, etc, etc


And now, if all this outside little, the cybercriminals begin to take advantage of the notoriety garnered by Zoom to impersonate that company and achieve and disseminate various kinds of malware.

The unlucky star Zoom

They achieve this by spreading legitimate versions of Zoom accompanied by installer programs that take advantage to ‘sneak’ into the computers of their victims malware as remote access trojans and even –according to have been disseminated by TrendMicro– software mining criptodivisas.

In this latter case, once installed this malware begins to undermine the criptodivisa Monero using the calculation capacity of the CPU and the GPU on the infected computer, which slows down its operation and overheat your hardware.

In other cases, the Zoom comes ‘accompanied’ of a trojan named njRAT or Bladabindithat gives the attacker full access to the computer, allowing -for example – capture images from the webcam or run any type of command.

The integrity of the installers of Zoom that offers its official website has not been compromised, so that everything indicates that there have been fraudulent websites that have been put in circulation these files malicious.

Until now, both the trojan as the ‘coinminer’ seem to be affecting only Windows 64-bit computers. If that is your case, the third best way to avoid being a victim of this malware is to have installed some anti-malware programs with real time protection enabled.

The second is to rely only on files that you download from the official website. And the first is, of course, opt for any alternative to the Zoom that counts in addition with a higher level of privacy protection.

Via | BleepingComputer


The news

Cybercriminals use Zoom to disseminate installers program full of malware

it was originally published in

Engadget

by
Marcos Merino

.

Me Time Tech

Recent Posts

The Rise of Spatial Computing: Evolution of Human-Computer Interaction

The Rise of Spatial Computing: Evolution of Human-Computer Interaction

2 months ago

Top 10 Benefits of AWS

Top 10 Benefits of AWS

2 months ago

Data Loss on Windows? Here’s How Windows Recovery Software Can Help

Data Loss on Windows? Here's How Windows Recovery Software Can Help

6 months ago

Integrating Widgets Seamlessly: Tips for Smooth Implementation and Functionality

Integrating Widgets Seamlessly: Tips for Smooth Implementation and Functionality

8 months ago

6 Tips to Reach Parents About Your School Sports Day Event

School sports days are a fun event for all students, but it’s important that the…

8 months ago

9 Reasons for Developing Your Own Mortgage App

9 Reasons for Developing Your Own Mortgage App

10 months ago