Fraudsters are exploiting platforms like Zoom and Microsoft Teams to scam brokers and consumers.
How do the scams work?
Fraudsters typically do not hack into Zoom or Teams directly. Instead, they manipulate users into granting access themselves. Here are some of the most common tactics:
Fake Invitations: Victims receive urgent-looking emails, texts, or messages containing links to what appears to be a legitimate meeting page.
Malicious Downloads: Victims are prompted to install “updates” that are actually remote access tools.
Remote Access Requests: Fraudsters pose as “Zoom” or IT support and request control during meetings.
Advanced Tactics: Some scams involve deepfake video/audio or spoofed caller IDs to appear real.
What happens after access?
Once access is granted, fraudsters can conduct extensive surveillance on the victim’s computer without their knowledge. This may include:
tracking keystrokes and capturing passwords;
monitoring activity and taking screenshots;
accessing and stealing sensitive files; and/or
moving within a company’s network.
How to Protect Yourself
Preventing these attacks requires awareness and implementation of proactive security practices such as:
verifying meeting requests through a separate, trusted channel;
installing updates from official sources;
creating and sending your own meeting links;
enabling multi-factor authentication (MFA); and
reporting suspicious activity immediately.
Brokers must remain vigilant, question unexpected requests, and prioritize cybersecurity best practices. If you believe you’ve been targeted, report it to the FBI Internet Crime Complaint Center (IC3).