Threat Analysis Stories: Stopping a Spoofing Attack that Exploited a Fake Zoom Invite

A threat actor attempted a spoofing attack by emailing a fake Zoom meeting invitation to employees. These types of links often trigger malware downloads or pull up fake login pages designed to harvest credentials.

Darktrace stopped this Zoom scam by identifying the fake Zoom meeting as a suspicious link, despite appearing to be from a known sender using a trustworthy service.

Video

Video

Threat Analysis Stories: Stopping a Spoofing Attack that Exploited a Fake Zoom Invite

Threat Analysis Stories: Stopping a Spoofing Attack that Exploited a Fake Zoom Invite

A threat actor attempted a spoofing attack by emailing a fake Zoom meeting invitation to employees. These types of links often trigger malware downloads or pull up fake login pages designed to harvest credentials.

Darktrace stopped this Zoom scam by identifying the fake Zoom meeting as a suspicious link, despite appearing to be from a known sender using a trustworthy service.

Download
Video
No Details required
Oops! Something went wrong while submitting the form.
8,900+ companies trust darktrace

This white paper includes

This resource includes

This case study includes

This data sheet includes

share this Resource