• Fake Zoom scripts launch malware hidden beneath thousands of lines of code and whitespace
  • LaunchDaemons ensure the malware runs at boot with admin rights once installed
  • Malicious components disguise themselves as legitimate tools like “icloud_helper” and “Wi-Fi Updater”

A new cyber campaign using fake Zoom applications is targeting organizations across North America, Europe, and the Asia-Pacific, experts have warned.

This cyber campaign, linked to North Korean hackers, is attributed to the BlueNoroff Group, a known affiliate of the infamous Lazarus Group, and spoofs legitimate video conferencing services from Zoom to fool victims.



Source link

Podcast also available on PocketCasts, SoundCloud, Spotify, Google Podcasts, Apple Podcasts, and RSS.