![]() Recipients would be hard-pressed to understand that this was, in fact, a site designed specifically to steal their credentials,” the company notes. The landing page is also a carbon copy of the Zoom login page except the only functionality on the phishing page are the login fields used to steal credentials. “The email looks and is formatted like a legitimate meeting reminder commonly used by Zoom. ![]() The provided link takes the victim to a spoofed Zoom login page hosted on. ![]() The purported topic of the meeting? The employee’s termination. Spotted by Abnormal Security, one phishing campaign comes in the form of emails seemingly coming from the organization’s Human Resources department, urging the recipient to attend a Zoom meeting scheduled to start in a few minutes: ![]() Two new ones are trying to exploit their (at the moment very rational) fears by delivering fake “Zoom meeting about termination” emails and fake notifications about COVID-19 stimulation/payroll processing. A few days ago, we outlined several phishing campaigns going after Zoom and WebEx credentials of employees. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |