Using virtual meeting platforms securely

Research by NordVPN shows that Americans, on average, spend 2 hours and 5 minutes a week making video calls via online meeting platforms like Zoom, Skype, and Microsoft Teams. With those platforms gaining popularity, cybersecurity experts warn users about the dangers of being scammed and infected by malware through them.

“Since the beginning of the Covid-19 pandemic, cybercriminals have been using visual meeting platforms as a new way to reach their victims. This resulted in new attacks that app developers were not ready for, including virtual meetings being disrupted by pornography and hate images, private meetings being made public, and many more serious issues,” Daniel Markuson, a cybersecurity expert at NordVPN, said.

The most recent reports on those cybercrime activities included the FBI public service announcement on February 16, which stated that criminals are using virtual meeting platforms for BEC (business email compromise) scams. Another issue was reported on February 17 by mail security provider Avanan, when hackers were spotted attaching .exe files to Microsoft Teams chats to install a trojan on an unsuspecting user’s device.

Explaining the dangers

A BEC scam is when a criminal hacks a business email account (a CEO’s, for example) to trick other employees into transferring money or giving up important company information. This is not a new issue. Losses related to these types of attacks increased to $1.8 billion in 2020, according to an FBI report (compared to $1.2 billion in 2018).

“The rise is associated with virtual meeting platforms’ usage to perform scams. Instead of sending a phishy email, criminals organise a video call on the hacked person’s end and pursue their colleagues to make money transfers, using deep-fake audio or instructing them via chat,” Markuson explained.

Criminals can also send an email asking employees to make a transaction, stating that the managing employee whose email account they hacked is currently in the meeting and cannot make a payment themselves.

“Malware can also be transferred through the chat section of the visual meeting platform. The biggest issue with these dangers is that there is very little a product developer can do at that point if the user is not well-informed or other points of a person’s communication (email or social media) are not secured in a proper way,” Makuson said.

“Even though many of us typically use virtual calling for work, it is important to stay cautious outside of it as well,” said Markuson, a cybersecurity expert at NordVPN.

To read more exclusive features and latest news please see our February issue here.

Media contact

Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI)….
Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing…
Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures.
Public Safety

IFPO Column: The Fear of Safety

Yolanda Hamblen of IFPO describes how the fear of safety could be holding us back, especially in the context of an unbalanced…
blackhat

Black Hat Europe Starts Soon

Black Hat Europe starts Monday and now is the perfect time to start planning your experience. With a full lineup of Keynotes…

VIVOTEK’s All-in-One Software Boosts Operational Efficiency for Enterprises

As demand for high-efficiency security systems rises among large enterprises, the global leading…
Assa Abloy website

WTC Amsterdam enhances security and efficiency with digital access solution

The World Trade Center (WTC) Amsterdam, home to over 300 companies, has upgraded its building security with a streamlined, digital access solution from ASSA ABLOY.
John Maddison website

Fortinet launches Lacework FortiCNAPP to enhance cloud-native security

In an advancement in cybersecurity, Fortinet has announced Lacework FortiCNAPP, providing organisations with visibility and security.
GITEX Global 2024 website

GITEX GLOBAL 2024: AI revolution drives strategic tech innovation

GITEX GLOBAL 2024 concluded on Friday, showcasing artificial intelligence (AI) as a transformative force driving business and economic growth
Scroll to Top