In early April, the same Trend Micro researchers found a cryptocurrency miner embedded in a working Zoom installer. These aren't the first instances of Zoom installers being corrupted by malware. "Both pieces of malware can be used to infiltrate systems of high-value targets in enterprises or non-business industries to steal proprietary and confidential information," the Trend Micro researchers wrote. It also checks to see what kind of antivirus software you might have installed. It's designed to hijack your webcam, take screenshots, log keystrokes and penetrate your firewall. The second bad installer reaches out to a remote server controlled by attackers and sets up its malware component to run upon system startup. The first of these two corrupted installers terminates any existing remote-desktop software, then opens up an obscure network port, steals the login credentials of the PC's legitimate user and allows its own remote attackers to connect to the PC.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |