Attacker use fake Zoom email to compromise Microsoft user data

Share post:

The ongoing pandemic of account spoofing and phishing attacks has knocked on the door of Zoom Technology, targeting over 21,000 users of a national healthcare company and bypassing Microsoft Exchange’s email security.

An email was sent from an address similar to the official Zoom email address and claims that the recipient cannot use the service until they click the link in the email to reactivate their account.

The email contains a hidden link in the text that redirects to a page hosted on an unrelated domain. This link leads you to a fake Microsoft login page hosted on a different domain to access the recipient’s Microsoft credentials, which can be used to access a larger ton of confidential material.

The attackers try to exploit people who need to access Zoom but may not notice that the URL has been redirected. Recipients who fall victim to this attack have compromised their Microsoft credentials as well as any other information stored on these accounts.

When an account is compromised, attackers gain access to existing email conversations, files in Microsoft Teams and Microsoft SharePoint, as well as the ability to use this account to send additional email attacks to the victim’s employees, partners and customers.

The attackers attempted to circumvent security measures by sending the email from a legitimate and trusted domain such as Zoom. Moreover, the email was written in such a way that no red flags were raised, either by email security tools or an unsuspecting recipient.

The sources for this piece include an article in TechRepublic.

SUBSCRIBE NOW

Related articles

North Korean Job Scam Targeting IT Job Seekers

North Korea’s Lazarus advanced persistent threat (APT) group has launched a sophisticated campaign, “Operation 99,” targeting freelance software...

Hackers Exploit FastHTTP in High-Speed Microsoft 365 Attacks

Threat actors are employing the FastHTTP Go library to launch high-speed brute-force password attacks on Microsoft 365 accounts...

YouTubers Targeted As Cyberattackers Hide Infostealers in YouTube Comments, Google Search Results

Attackers have found a new way to infect people seeking pirated or cracked software: planting malicious download links...

New macOS Malware Exploits Apple’s Security Features to Stay Hidden and Steal User Data

A newly discovered variant of the Banshee macOS Stealer malware is putting 100 million Apple users at risk...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways