Crypto scammers have launched a new phishing attack using fake Zoom links to install malware on victims' computers.
On July 22, cybersecurity expert “NFT_Dreww” alerted the community about this sophisticated scam on X (formerly Twitter), revealing that it has already led to $300,000 in stolen cryptocurrency.
Here’s how it works: Scammers target NFT holders or crypto investors by pretending to be interested in their intellectual property or proposing collaborations. They insist on using Zoom for communication and send a link to join a meeting.
The link leads to a fake Zoom page with a loading screen that prompts users to download “ZoomInstallerFull.exe,” which is actually malware.
Once the malware is installed, it infiltrates the victim’s computer and redirects them to the real Zoom platform, making the scam less noticeable. The malware adds itself to the Windows Defender exclusion list to avoid detection and begins extracting information while the user is distracted by the fake loading process.
To stay under the radar, scammers frequently change their domain names. This is their fifth domain for this scam. Recently, there have also been reports of malicious emails from scammers posing as crypto influencers, containing attachments designed to install malware.
An effort by Bitcoin SV investors to seek billions in compensation from major crypto exchanges has largely fallen flat in the UK Court of Appeal.
A previously undisclosed security breach has exposed sensitive user data of nearly 70,000 Coinbase customers, following what appears to be an internal compromise involving bribed support staff.
Braden Karony, once the public face of SafeMoon, has been found guilty in a major fraud case involving the misuse of billions in investor funds.
Panic swept through decentralized markets on Thursday after a suspected vulnerability in Cetus Protocol triggered a massive liquidity drain across several Sui-based tokens.