Zoom-themed cyber attacks fuel rapid malware growth
The Vidar malware has become more popular since August, allowing threat actors to steal sensitive information, IP addresses, and crypto wallets from infected devices


Cyber attacks that lure victims with themes around popular video conferencing service Zoom have helped increase malware growth, with one named Vidar becoming more popular in rapid time.
Vidar occupies position number eight, up seven places from August, in Check Point Research’s (CPR) Global Threat Index for September 2022. The CPR report found that although Formbook, an infostealer targeting Windows OS that currently affects 3% of organisations around the world, is still the most prevalent malware, the steep rise of Vidar is notable.
Vidar is an infostealer designed to give threat actors backdoor access, allowing them to steal sensitive banking information, login credentials, IP addresses, browser history, and crypto wallets from infected devices.
The increase in its prevalence comes after a malicious campaign in which fake Zoom websites, like zoomus[.]website and zoom-download[.]space, were used to lure users into downloading the malware.
“In terms of the most prevalent malwares in September, it’s interesting to see Vidar leap into the top ten after a long absence,” said Maya Horowitz, VP of research at Check Point. “Users of Zoom need to stay alert to fraudulent links as this is how the Vidar malware has been distributed lately. Always keep an eye out for inconsistencies or misspelt words in URLs. If it looks suspicious, it probably is.”
Formbook was the most prevalent malware this month impacting 3% of organisations worldwide, followed by XMRig and AgentTesla which both impact 2% of organisations globally.
RELATED RESOURCE
CIO Priorities: 2020 vs 2023
Zero Trust, SaaS Security, and its impact on SD-WAN being a priority
Formbook was first detected in 2016 and is marketed as a malware as a service (MaaS) operation in underground hacking forums. It's known for having substantial anti-detection capabilities and a relatively low price.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The malware harvests credentials from various web browsers, collects screenshots, monitors, and logs keystrokes. It can also download and execute files according to orders from its command and control infrastructure (C2).
XMRig, on the other hand, is open source CPU software used to mine Monero cryptocurrency. Threat actors often abuse this open-source software by integrating it into their malware to conduct illegal mining on victim’s devices, according to Check Point.
Additionally, AgentTesla is an advanced RAT functioning as a keylogger and information stealer. It’s capable of monitoring and collecting a victim’s keyboard input, system keyboard, taking screenshots, and exfiltrating credentials to a variety of software installed on a victim’s machine (including in Google Chrome, Mozilla Firefox, and the Microsoft Outlook email client).
The type of vulnerability most exploited this month was a 'web server exposed git repository information disclosure, impacting 43% of organisations globally. Successful exploitation of this flaw can facilitate the unintentional disclosure of account information in the impacted product.
This was followed by Log4Shell which dropped from first place to second and impacted 42% of organisations. It was discovered late last year and sent shockwaves through the security community due to how many organisations were believed to be exposed.
Zach Marzouk is a former ITPro, CloudPro, and ChannelPro staff writer, covering topics like security, privacy, worker rights, and startups, primarily in the Asia Pacific and the US regions. Zach joined ITPro in 2017 where he was introduced to the world of B2B technology as a junior staff writer, before he returned to Argentina in 2018, working in communications and as a copywriter. In 2021, he made his way back to ITPro as a staff writer during the pandemic, before joining the world of freelance in 2022.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd
-
Capita handed £50m London police contract weeks after losing pension data
News The outsourcer will provide digital fraud reporting services after its cyber incident disclosure drew criticism
By Rory Bathgate
-
Supercharge trust for operations
Whitepaper Innovating through uncertainty
By ITPro
-
Western Digital suffers cyber attack, shuts down systems
News Customers are taking to Twitter to report they’re unable to log into their storage products through Western Digital’s online portal
By Zach Marzouk
-
Lazarus blamed for 3CX attack as byte-to-byte code match discovered
News Additional analysis suggested 3CX developer teams ignored "red flags"
By Zach Marzouk
-
Some GitHub users must take action after RSA SSH host key exposed
News One cloud security expert likened the incident to the infamous HeartBleed bug from 2014
By Zach Marzouk
-
Latitude hack now under state investigation as customers struggle to protect their accounts
News The cyber attack has affected around 330,000 customers, although the company has said this is likely to increase
By Zach Marzouk
-
Four-year-old iframe flaw allows hackers to steal Bitwarden passwords
News The password manager has known about the issue since 2018, publicising it in a report in 2018
By Zach Marzouk
-
WH Smith hit by cyber attack, current and former staff data accessed
News The company stated that it is notifying staff members who have been affected
By Zach Marzouk