Fake Zoom meeting invitations are being sent out by hackers to steal Microsoft credentials
Outlook and Office 365 credentials are being targeted by hackers via fake Zoom meeting invites.
Over the past months, Zoom has been one of the most widely used apps and has been exploited by hackers to fulfill their malicious intentions on several occasions. With over 300 million participants every day, Zoom is a highly lucrative target for malicious elements.
Attackers have sent very convincing phishing emails to Zoom users with a variety of messages including but not limited to reviewing a meeting invitation, downloading a file attached to access details about a meeting invitation, and downloading a particular attachment to start the meeting in itself.
Upon clicking on the "Review Meeting Invitation" the user is redirected to a fake Outlook or Office 365 login page. This page is handled by hackers and is used to steal sensitive information from the user.
NPAV recommends users to stop trusting these fake emails and never download any file or visit any link shared via these emails. Sharing any information or downloading any file from these emails simply mean that you are compromising your cyber security.
Install NPAV on your devices and stay protected from all kinds of cyber attacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (128)
- Events and News (26)
- Features (45)
- Security (433)
- Tips (79)
- Google (22)
- Achievements (9)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (195)
- Cyber Attack (221)
- Data Backup (11)
- Data Breach (80)
- Phishing (139)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (56)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (71)
- Hacking (57)
- Social Media (7)
- vulnerability (54)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (7)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)