Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Zoom Phishing Attack Steals Corporate Logins

May 20, 2025
Reading Time: 3 mins read
in Alerts
W3LL Phishing Kit Steals Microsoft Logins

A new sophisticated phishing campaign is actively targeting many corporate Zoom application users. It exploits the widespread popularity of Zoom meetings using deceptive fake meeting invitations. These carefully crafted invitations appear to come directly from the users’ trusted colleagues. The attack cleverly uses social engineering tactics to create a false sense of urgency. This prompts unsuspecting victims to quickly click on malicious links embedded in these emails. The phishing emails are designed to closely resemble official Zoom meeting notification messages. They include familiar company branding specific formatting and language requiring immediate user response. This campaign poses a significant security risk to businesses relying heavily on Zoom.

Once a link is clicked users are directed through a deceptive multi-stage sequence. The primary goal of this sequence is to harvest valid Zoom login credentials. Phishing emails often contain very urgent subject lines like “Missed Zoom Call” for example. Or they might use “Urgent Meeting Request” to elicit quick unthinking user responses. This targets busy professionals who are often juggling multiple communications throughout their workday. After clicking victims are then redirected to a convincing replica of a Zoom interface. This fake interface displays what appears to be colleagues already waiting in a video conference. It creates the strong illusion of a legitimate meeting currently in active progress. This tactic adds significant psychological pressure on the victim to join the meeting quickly.

Security researchers from SpiderLabs identified this new and effective phishing campaign just yesterday.

They officially noted its particular effectiveness against users on Monday May 19, 2025. This effectiveness is largely due to the clever implementation of pre-recorded video elements. These dynamic video elements convincingly simulate an actual live Zoom meeting environment for victims. The security team reported this attack represents an evolution in current phishing techniques. It actively uses these dynamic visual elements to help overcome potential user skepticism. The sophisticated infection mechanism carefully follows a meticulously designed five-stage attack process.

This detailed process begins when a victim receives the initial phishing email and clicks.

After the user clicks the link a fake Zoom loading screen is first presented. The page then transitions to display a pre-recorded video showing “participants” in a meeting. This creates a very convincing illusion for the user of a live conference call. Shortly thereafter users will receive a fake system disconnection notification message on their screen. This is then immediately followed by a fraudulent Zoom login prompt designed to capture credentials. The attack infrastructure for this campaign utilizes a number of different registered domains. Initial victim tracking is performed through the use of cirrusinsight.com specific subdomains. The fake Zoom meeting pages themselves are primarily hosted on various r2.dev cloud services. Analysis reveals stolen credentials are transmitted via Telegram API endpoints to the attackers. This method allows real-time data collection while often bypassing existing network security controls.

Reference:

  • Sophisticated Zoom Phishing Lures Corporate With Fake Video Meetings Steals Logins
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

Apple Warns Users As CERT-FR Confirms

Former Feds Targeted By Chinese Jobs

September 12, 2025
Apple Warns Users As CERT-FR Confirms

CHILLYHELL And ZynorRAT Threaten Systems

September 12, 2025
Apple Warns Users As CERT-FR Confirms

Apple Warns Users As CERT-FR Confirms

September 12, 2025
SAP Patches Critical NetWeaver Flaw

EggStreme Malware Hits Philippine Military

September 11, 2025
SAP Patches Critical NetWeaver Flaw

RatOn Malware Hits Android Banking

September 11, 2025
SAP Patches Critical NetWeaver Flaw

SAP Patches Critical NetWeaver Flaw

September 11, 2025

Latest Alerts

Former Feds Targeted By Chinese Jobs

CHILLYHELL And ZynorRAT Threaten Systems

Apple Warns Users As CERT-FR Confirms

RatOn Malware Hits Android Banking

EggStreme Malware Hits Philippine Military

SAP Patches Critical NetWeaver Flaw

Subscribe to our newsletter

    Latest Incidents

    Panama Economy Ministry Reports Breach

    LNER Warns Customers Of Data Breach

    Hello Gym Leak Exposes Member Audio

    DDoS Defender Hit by Massive Attack

    Vienna VA Reports Data Breach Leak

    GitHub Hack Triggers Salesloft Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial