Categories: Techno

Hackers are using Zoom for phishing attacks and cryptocurrency theft

Analysts have reported a new surge in phishing attacks targeting crypto wallet owners. Fraudsters disguise phishing links as invitations to a Zoom video meeting, and when the victim clicks on this link, special software for data theft and crypto address hacking is downloaded to the device.

What else is known

For phishing links, hackers use a fake domain, for example app[.]us4zoom[.]us, which is as similar as possible to a real Zoom conference link. The site to which the phishing link redirects also resembles the Zoom resource. And after clicking the “Start conference” button The malware installation package is downloaded to Zoom.

In addition, the malware collects system information, browser and Telegram data, cookies, as well as seed phrases and crypto wallet keys. The information is then sent to servers controlled by the hackers.

Natasha Kumar

Natasha Kumar has been a reporter on the news desk since 2018. Before that she wrote about young adolescence and family dynamics for Styles and was the legal affairs correspondent for the Metro desk. Before joining The Times Hub, Natasha Kumar worked as a staff writer at the Village Voice and a freelancer for Newsday, The Wall Street Journal, GQ and Mirabella. To get in touch, contact me through my natasha@thetimeshub.in 1-800-268-7116

Share
Published by
Natasha Kumar

Recent Posts

Weapons of Victory: What New Western Equipment Was Transferred to Ukraine in 2024

Ukraine continued to fight for its independence on the battlefield in 2024. And in this,…

3 hours ago

Scientists have created a revolutionary navigation system for combat drones that does not require GPS

Australian engineers have developed an innovative navigation system for unmanned aerial vehicles that uses a…

3 hours ago

Woman lost 34 thousand hryvnias trying to apply for assistance online

A woman from Ternopil lost 34 thousand from her payment card trying to apply for…

3 hours ago

How to organize files on your computer: a simple and reliable method

If you've already accumulated a series of folders on your computer called "Unsorted", "Unsorted1", "Unsorted2",…

3 hours ago

French city to use drones to combat illegal construction

The city hall of Cannes plans to use drones to monitor work on construction sites.…

7 hours ago

Ukrainian and Czech engineers have developed a jet engine for drones

The Ukrainian company «Progres» together with the Czech company PBS, completed work on the development…

7 hours ago