loader image
Hacker silhouette with laptop showing Zoom icon over North Korean flag, North Korean Hackers Target Firms concept.
North Korean Hackers Target Firms With Fake Zoom Apps

North Korean hackers target firms by deploying fake Zoom applications to hijack systems through deceptive video conferencing setups. The attackers use LinkedIn to pose as business professionals, initiating contact under the guise of legitimate investment or partnership inquiries.

Once trust is established, the attackers invite victims to meetings hosted on spoofed domains resembling Zoom infrastructure, such as “zoom.usweb08.us.” North Korean hackers target firms’ executives and founders, often luring them into executing terminal commands during fake troubleshooting sessions.

The malware mimics the Zoom interface, complete with participant tiles and chat functions. Victims encounter fabricated audio issues, prompting attackers to instruct them to run malicious commands.

The campaign’s infrastructure includes recently registered domains and encrypted messaging channels. Attackers use calendar bookings and urgent pre-meeting messages to increase pressure.

Researchers uncovered a coordinated effort involving repeated tactics across multiple targets, suggesting sophisticated planning.

Read the full report at: https://cybersecuritynews.com/north-korean-hackers-trick-users-with-weaponized-zoom-apps/

Write a Reply or Comment

Your email address will not be published. Required fields are marked *