Skip to content

Have you downloaded Zoom... or is it malware?

1 Min
Table Of Contents
Have you downloaded Zoom... or is it malware?

Have you downloaded Zoom... or is it malware?

Zoom is one of the first names that come to mind when thinking about remote working tools and online chatting.

As a result of its popularity, cybercriminals have gained access to it. The thieves are using the name of the company to steal sensitive information.

Researchers have discovered several convincing-looking download sites. These are fakes. Fake Zoom software will often get bundled with 'information stealers' and other malware or malicious software designed to tempt you to download and install it.

Using one of these sites mistakenly thinking that you are downloading Zoom updates puts your sensitive data at risk. These could include your banking information, passwords, or browsing history.

Some hackers can even steal multi-factor authentication details. Cybercriminals could access data that is sensitive as a result.

On the dark web, these 'stealer logs' are also available for purchase by criminals, who can use them to infiltrate business networks.

Every piece of data you store becomes a target once a cybercriminal gains access to your network. Data theft or ransomware attacks can be highly damaging in extreme cases.

To prevent being taken advantage of by these fake websites, here are a few simple steps you can take:

  • You must double-check the website address you are on before downloading Zoom (or any other application). Is it what you were expecting? For example, if you click an email to get to that site, are you 100% sure it's from a genuine company?
  • Examine the rest of the web page to see if there are any mistakes or strange layouts.
  • Updating your antivirus software and suspicious scanning downloads regularly will prevent malware from entering your system.
  • Make sure your business follows this advice.

 

Get in touch with Inflection Point if you need help or advice to protect your business from malware and other security threats.