Hackers Are Bundling Cryptominer With a Seemingly Legit Zoom Installer on Unofficial Websites

  •  
  •  
  •  
  • 1
  •  
  •  
  •  
    1
    Share

Recently, Zoom has remained present in the news world owing to numerous security issues with their app. While they managed to address most of them, they couldn’t stop the hackers from exploiting the app’s fame. Cybercriminals have now targeted the video conferencing app Zoom owing to its growing popularity amidst COVID-19 and have bundled a seemingly legit Zoom installer with a cryptominer to exploit users.

Cryptominer Bundled With Zoom

Researchers from Trend Micro have found cybercriminals targeting the Zoom app installer with a cryptominer. As revealed in their post, hackers have bundled the legit Zoom installer, available on unofficial websites, with Coinminer.

In brief, whenever a user attempts to download the Zoom app from a malicious third-party website, the malware reaches their device together with the installer. The bundled AutoIt compiled malware Trojan.Win32.MOOZ.THCCABO drops numerous files to the device, most of which carry Coinminer. The dropped files also include a task scheduler and the legit Zoom installer for version 4.4.0.0.

The malware gathers various details from the target device regarding the operating system, GPU, CPU, video controllers, and processors.

Furthermore, it also checks the system for the presence of Microsoft SmartScreen, Windows Defender, and some other popular antivirus solutions. It also attempts to evade detection by looking for other monitoring tools.

Following this discovery, Trend Micro reached out to Zoom officials to inform them of the matter. As stated in their post,

We have been working with Zoom to ensure that they are able to communicate this to their users appropriately.

What Should You Do?

Considering that the hackers have only meddled with the installer available on unofficial websites, users should stick to the official website only for downloading Zoom. In fact, this applies to every software or app that the users wish to install.

Let us know your thoughts in the comments.

The following two tabs change content below.

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]

Abeerah Hashim

Abeerah has been a passionate blogger for several years with a particular interest towards science and technology. She is crazy to know everything about the latest tech developments. Knowing and writing about cybersecurity, hacking, and spying has always enchanted her. When she is not writing, what else can be a better pastime than web surfing and staying updated about the tech world! Reach out to me at: [email protected]

Do NOT follow this link or you will be banned from the site!