Rivercity Technology Services LTD Logo
About Us
Services
Icon showing a support technician
IT Support Services
Cybersecurity Risk Management at one predictable flat rate.
Icon of light bulbs on a laptop screen
IT Consulting
Business optimization through the smart use of technology.
Icon showing a hand holding a phone
Business Phone Services
VoIP Telephone solutions from RCT. 
Icon showing a database and a cloud
Backups & Recovery
Cloud & On Premise - ready to recover!
Icon showing computer code on a monitor
Software Development
Web & Mobile App development
Icon showing website wireframes
Website Development & Hosting
Web design and full hosting & maintenance packages!
Icon showing an envelope being opened
Modern Email Management
Microsoft 365 email provisioning, security & management.
Icon of a magnifying glass inspecting binary code on a computer screen
Cybersecurity Risk Assessment
Internal auditing to help identify potential cyber threats.
“You’re giving me the ‘it’s not you, it’s me’ routine? I invented ‘it’s not you, it’s me.’ Nobody tells me it’s them not me; if it’s anybody, it’s me.”
- George Costanza
Learning CenterNewsletterContact Us
Book A Consultation
Person using Zoom on a laptop

Zoom: Are You Really Downloading It or Is It Malware?

The popularity of Zoom exploded during the pandemic, and now that more people are still working from home Zoom continues to be widely popular. But its popularity has opened the door for cybercriminals. According to researchers, they have discovered at least six convincing-looking download sites. The sites aren’t the real thing and temp the user into downloading FAKE Zoom software, containing 'info stealers' and other forms of malware (malicious software). If you download a zoom update from one of these sites thinking that they’re the real thing you run the major risk of your sensitive data being stolen, things like your banking info, passwords or browser history. In the worst cases, your multi-factor authentication details can also be stolen.

Research also found "stealer logs" for sale on the dark web. This is where criminals can buy the information that has been stolen from you and use it again to gain access to your business networks. Once a cybercriminal has access to your network, every single piece of data stored is vulnerable and becomes a target. In extreme cases, this can leave you open to ransomware attacks or data theft.

Although these FAKE sites can be very real looking and convincing, try these steps to help spot the real from the fake:

  • Before you download the Zoom application (or any application), double-check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Ensure your security software is up to date and actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business and teach your team what to look out for.

Get in touch if you need help or advice to protect your business from malware and other security threats.

Until next time, keep fit and have fun!

(TYYV) The Yada Yada Version:

Fake Zoom download sites have been spotted across the web and Yada Yada Yada, don't be fooled! Make sure you're taking extra precautions when downloading software online.

Mitch Redekopp
Article Written by Mitch Redekopp

Get in Touch

Need IT Services or Cybersecurity for your business? Have tech questons? Contact us today, we'd love to help you!
Blog Sidebar Contact Form
Related Articles
Featured image
Embrace the Cloud!
Cloud computing has taken the business world by storm, offering many many advantages like streamlined operations, cost reduction, and increased flexibility....

Copyright © 2023 - All Rights Reserved

crossmenu