iTnews
  • Home
  • News
  • Technology
  • Security

Phishers quick to exploit remote working apps in COVID-19 lockdown

By Juha Saarinen on Mar 31, 2020 7:14AM
Phishers quick to exploit remote working apps in COVID-19 lockdown

Microsoft Teams and Zoom users targeted.

Security researchers have seen a sharp uptick in hackers attempting to exploit popular online communications platforms in order to compromise users' systems using malware.

Every leading communications platform has been targeted by cyber criminals setting up phishing websites, including the Zoom video conferencing and Microsoft Teams collaboration suites, security vendor Check Point warned.

Check Point had found malicious files with names crafted to make them appear as bone fide Zoom and Microsoft Teams applications, but which install the InstallCore program.

InstallCore is classified by security vendors as a potentially unwanted application (PUA) threat, which can be used to install adware and malicious applications.

More than 1700 new domains with the name "zoom" in them have been registered since the beginning of the year, and a quarter of them in the last week, Check Point said.

Four per cent of the newly registered domains have malicious characteristics, the security vendor said.

Google's official classroom.google.com web based educational tool has also been targeted with phishers registering deceptive domains like googieclassrom.com. 

Users of remote working and learning tools are advised to take extra care if they receive emails and files from unknown senders, particularly if they contain special deals or discount offers.

Clicking on links and opening unknown attachments in the emails is dangerous and could lead to computers being taken over, and users are advised not to do that.

Check Point also advised users to look for lookalike domain names that try to impersonate legitimate ones, spelling errors in emails and websites and be cautious of unfamiliar email senders.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
googlemalwaremicrosoft teamssecurityzoom

Partner Content

Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Mar 31 2020
7:14AM
0 Comments

Related Articles

  • Google adds phishing protection to Workspace apps
  • Any Android security app is better than Google Play Protect
  • ACCC starts review of Google's Mandiant buyout
  • Threat actors worked with ISPs to plant malware from Italian spyware vendor
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

PayTo rollout kicks off

PayTo rollout kicks off

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.