
A new phishing campaign leveraging malicious Zoom invitations is targeting workplace credentials via deceptive hyperlinking or URL masking and fake interactive call pages, ultimately prompting users to ‘rejoin’ after a fake connection issue.
The campaign posing substantial risks to individuals and organizations alike was detailed in the Cofense Phishing Defense Center's latest security report.
This campaign manipulates recipients into urgency-based actions, as email subjects such as "URGENT - Emergency Meeting" are crafted to trigger immediate responses.
They contain links to fake Zoom meeting interfaces designed to appear authentic, which is known as deceptive hyperlinking or URL masking, complete with realistic visuals..
In this campaign, the landing page URL is visibly different from the legitimate one and even features interactive meeting participants.
However, a dialog box invoking a connection timeout appears shortly, redirecting users to malicious landing pages that mimic Zoom's login interface, sometimes complete with pre-filled email fields, allegedly allowing them to rejoin the session.
Once credentials are entered, these and the IP address, country, and region are sent through secure channels, such as Telegram, to the attackers.
Compromised credentials allow attackers to infiltrate enterprise systems, enabling lateral movement, data theft, and Advanced Persistent Threats (APTs). These attacks can jeopardize organizational security, leading to significant financial and reputational damage.
Abu Qureshi, Threat Research and Mitigation Lead at BforeAI, provided TechNadu with essential phishing prevention tips, stating that identifying phishing platforms “is technically possible, but it requires awareness and vigilance.”
To safeguard against these Zoom phishing attempts, consider these online security tips:
This fake Zoom call phishing attack highlights the importance of vigilance and robust cybersecurity practices to prevent Zoom credential theft and protect sensitive organizational assets.