Trap: Fake Skype, Zoom and Google Meet websites

Share post

Some attackers use online meeting services as bait for malware. Researchers at Zscaler found fake Skype, Zoom and Google Meet websites that were used by threat actors to spread Remote Access Trojans - RAT for short.

Zscaler's ThreatLabZ team warns about fake online meeting sites that distribute various malware families. Already at the beginning of December 2023, the researchers discovered a threat actor who creates fake Skype, Google Meet and Zoom websites to spread malware in order to spread remote access Trojans such as SpyNote RAT to Android users and NjRAT and DCRat to Windows users . These pages keep appearing in new versions.

Attack chain and execution flow for Android and Windows campaigns

🔎 The attack chain and execution flow for Android and Windows campaigns (Image: Zscaler).

Deceptively real web addresses as a trap

The malware actor used shared web hosting and hosted all fake websites for online meetings on a single IP address. The URLs of the fake websites were very similar to the real ones, so that the fake cannot be recognized at a glance. When a user visits one of the fake websites, clicking on the Android button will start downloading a malicious APK file. Clicking on the corresponding Windows button, however, triggers the download of a BAT file. When executed, the BAT file provides additional actions that ultimately result in the download of a RAT payload.

False websites with Skype

During their investigation, security researchers discovered that the first fake and now blocked website “join-skype[.]info” was created in early December to trick users into downloading a fake Skype application.

The Windows button pointed to a file called “Skype8.exe” and the Google Play button pointed to “Skype.apk”. The Apple App Store button only redirected to the original Skype for iOS page, indicating that the threat actor did not target iOS users with its malware.

Incorrect meeting pages for Google Meet and Zoom

At the end of December, the attacker created another fake website that imitated Google Meet. The fake Google Meet page was hosted with the “gry-ucdu-fhc” subpath visible. It was intentionally created to resemble a Google Meet join link. The experts also found a fake Zoom page for Zoom at the end of January 2024. Their URL contained a subpath very similar to a meeting ID generated by the Zoom client.

RAT – Remote Access Trojans were ready

The threat actors target companies with this campaign and use well-known and popular online meeting services as bait to spread RATs for Android and Windows. These Remote Access Trojans are capable of stealing confidential information, logging keystrokes, or siphoning files.

These findings highlight the need for robust security measures to protect against evolving threats, as well as the importance of regular updates and security patches. The Zscaler Cloud Sandbox recognizes the samples by their behavior and refers to specific MITER ATT&ACK techniques that are triggered during the analysis.

More at ZScaler.com

 


About Zscaler

Zscaler accelerates digital transformation so customers can become more agile, efficient, resilient, and secure. Zscaler Zero Trust Exchange protects thousands of customers from cyberattacks and data loss by securely connecting people, devices, and applications anywhere. The SSE-based Zero Trust Exchange is the world's largest inline cloud security platform, distributed across 150+ data centers around the world.


 

Matching articles on the topic

Trap: Fake Skype, Zoom and Google Meet websites

Some attackers use online meeting services as bait for malware. Zscaler researchers found fake Skype, Zoom and Google Meet websites, ➡ Read more

Increase in ransomware attacks and compliance failures

An annual report highlights the latest threats, trends and emerging topics in data security. It is based on a survey ➡ Read more

Protect identities with intelligent authorization controls

The number of human and non-human identities in organizations is growing rapidly, and sooner or later each of these identities will need access ➡ Read more

Holy LG WebOS endangers presentation TVs in companies 

Many companies now have large TV sets in conference rooms for events or video conferences. This unexpectedly also has vulnerabilities behind it ➡ Read more

New Exchange Online protection for companies

The cyber defense specialist G DATA is launching a new solution for Exchange Online. G DATA 365 Mail Protection should ➡ Read more

After the LockBit blow: What about ransomware attacks?

In a current report, Trend Micro analyzes the ransomware landscape and provides an outlook on the impact of the interruption of LockBit activities ➡ Read more

Impact of NIS2 on cybersecurity in healthcare

The revision of the EU directive to increase cybersecurity for critical infrastructures (NIS2) still has the issue of cybersecurity in many healthcare facilities ➡ Read more

Cyberattacks via API

In the first month of 2024, the frequency of API attacks has increased, affecting an average of 1 in 4,6 companies per ➡ Read more