Are you really downloading Zoom - or is it malware? • Blisstech Solutions

When you think about tools for remote working and chatting online, Zoom may be one of the first names in your mind.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch.

More Content

Why you will not be fine on this Cloud9

Fake Flash messages are being used as a cover for a new ‘botnet’ campaign. If you use Google Chrome or Microsoft Edge you could be a target.

Can your business go green by switching to the cloud?

Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. But are you swayed by the idea that cloud services are automatically better for the environment? Could the need to do your bit ‘cloud’ your decision-making? Sorry. Bad pun. It’s true that cloud services have environmental benefits compared …
Read More

Important: Protect your business from digital fraud

Important: Protect your business from digital fraud

Digital fraud isn’t on the rise. It’s evolving. Fast.
Scammers are using smarter tools, more convincing messages and pressure tactics designed to make even careful people slip up.
These are the simple habits that could stop your team from falling for them…

Tech Tip: How to share files securely in Teams

Welcome to a new Tuesday tech tip video where we will be exploring how to share files securely with people outside of your organisation using Microsoft 365 and Teams. Microsoft Teams is a powerful tool that allows for seamless collaboration and communication within an...
Microsoft plans a naming system for hackers

Microsoft plans a naming system for hackers

Hacking groups are given different names by different security companies. And that means you don’t know who’s really behind an attack so can’t react as quickly as you’d like. That’s about to change, thanks to Microsoft…

Cyber extortion: What is it and what’s the risk to your business?

Cyber extortion: What is it and what’s the risk to your business?

Have you heard of cyber extortion? It’s a very real threat to your business. Here we explain what it is and how to stay safe.

Exciting new formatting tools for Notepad

Exciting new formatting tools for Notepad

There’s a quiet update on the way for Notepad that might make a big difference to how you take notes, prep for meetings, or share quick updates with your team. Simple, fast, and now, just a bit smarter…

Scam hazard signs

How to spot a scam

Would you know how to recognise a scam? In the 21st century, you are highly unlikely to encounter a con artist in the street as they hide behind phones, text messages and emails.  But the motivations behind 21st-century fraudsters have not changed; they want to make...
How to reopen a closed browser tab thumbnail

Tech Tip: How to quickly reopen a closed browser tab

Welcome to a new Tuesday tech tip video, and it's a really quick, but useful one This video shows how to quickly reopen a closed browser tab in Google Chrome or Edge. The video demonstrates a keyboard shortcut (Ctrl+Shift+T) to restore the last closed tab. I will also...

Tech Tip: How to check if your device is compatible with Windows 11

Welcome to a new Tuesday tech tip video. In it, I will show you how to check if your device is compatible with Windows 11. With Microsoft's termination of support for Windows 10  in October 2025, it's crucial for business leaders to proactively plan for the transition...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05