Zoom Doom: When Your Teleconference Turns into a Malware Conference

In a not-so-typical Zoom meeting, a threat actor masquerades as a Zoom installer using d3f@ckloader to drop SectopRAT. After nine days of lurking, Cobalt Strike and Brute Ratel join the party. The grand finale? BlackSuit ransomware crashes the Windows systems, leaving IT teams wishing they’d just clicked “Leave Meeting.”

Pro Dashboard

Hot Take:

Why did the cybercriminal install a fake Zoom? Because they couldn’t find a fake Microsoft Teams! In a world where the line between legitimate software and malware is thinner than my patience for passwords, this latest cyber shenanigan is a reminder that even our Zoom meetings aren’t safe. Watch out for those Zoom installers, folks, they might just be installing a new kind of “meeting” on your hard drive!

Key Points:

  • A fake Zoom installer drops SectopRAT, which leads to deploying Cobalt Strike and Brute Ratel.
  • Lateral movement achieved using remote services and RDP, facilitated by QDoor malware.
  • Exfiltration of files via WinRAR and upload to the cloud app Bublup.
  • Final deployment of BlackSuit ransomware across Windows systems using PsExec.
  • DFIR Labs offers comprehensive analysis services on such cybersecurity incidents.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?