A phishing campaign is impersonating Zoom in order to steal users’ Microsoft credentials, according to Lauryn Cash at Armorblox. The emails landed in about 10,000 inboxes, and targeted “a major online mortgage brokerage company located in North America.”
“The email took advantage of the end users’ natural instinct (in any Zoom call) to start the meeting,” Cash writes. “When the user clicked on the link to start the meeting they fell into the trap of the malicious attack and were navigated to a landing page that mimics a Microsoft Outlook login screen.”
The emails also contained the users’ real names, which increased the legitimacy of the attack.
“The email title, sender name, and content aimed to induce trust and urgency in the victims - trust because the email claimed to come from a legitimate company, Zoom, and a sense of urgency because it claimed the victim was late to starting a meeting,” Cash writes. “The email included the victim’s name in the title as well, further adding a sophisticated nature to the targeted attack.”
Cash recommends that users should be cautious when clicking on links in emails, especially if the email is unexpected.
“Since we receive an abundance of emails from service providers, our brains have been trained to quickly execute on the requested actions,” Cash says. “It’s best to engage with these emails in a rational and methodical manner whenever possible – easier said than done, we know! A best practice is to perform an ‘eye test’ on the email received that includes inspecting the sender name, email address, language within the email, and any logical inconsistencies within the email.”
Cash adds that you should also enable multi-factor authentication and use a password manager to make it more difficult for attackers to gain access to your account.
We all have a tendency to drop our guard when we encounter the familiar. New-school security awareness training can teach your employees to follow security best practices so they can thwart phishing attacks.
Armorblox has the story.