Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Look mom HR application, look mom no job - phishing using Zoom docs to harvest Gmail creds

0
Medium
Published: Wed Oct 08 2025 (10/08/2025, 13:03:55 UTC)
Source: Reddit NetSec

Description

A phishing campaign leverages Zoom's document sharing feature to establish initial trust with victims. The attack directs users through a fake bot protection page before presenting a Gmail-like login interface to harvest credentials. Entered credentials are transmitted to the attacker via WebSocket and validated on the backend. This technique exploits user trust in Zoom and mimics legitimate Gmail login to increase success rates. The campaign is currently observed with minimal discussion and no known widespread exploitation. It poses a medium risk due to credential compromise potential without requiring advanced exploitation or vulnerabilities. European organizations using Gmail and Zoom are at risk, especially those with remote workforces relying on these platforms. Attackers can gain unauthorized access to email accounts, leading to data breaches and further attacks. Mitigation requires user awareness, multi-factor authentication enforcement, and monitoring for suspicious login attempts. Countries with high Zoom and Gmail usage and significant remote work adoption are most likely affected.

AI-Powered Analysis

AILast updated: 10/08/2025, 13:11:49 UTC

Technical Analysis

This phishing campaign exploits the trust users place in Zoom's document sharing feature by initiating the attack through a shared Zoom document link. Victims are first forced through a fake 'bot protection' gate, a social engineering tactic designed to mimic legitimate security checks and lower suspicion. Following this, users encounter a counterfeit Gmail login page crafted to closely resemble the authentic interface. When users input their Gmail credentials, these are immediately transmitted to the attacker via a WebSocket connection, allowing real-time credential harvesting. The attacker’s backend system validates the credentials, confirming their accuracy and enabling immediate use for further malicious activities. This attack vector does not rely on software vulnerabilities but rather on deception and user interaction, making it a classic phishing technique enhanced by leveraging trusted platforms like Zoom. The campaign is currently documented on Reddit's NetSec community with minimal discussion and no evidence of widespread exploitation or automated mass attacks. The absence of affected software versions or patches indicates this is a social engineering threat rather than a technical vulnerability. The campaign's medium severity reflects the potential for credential compromise leading to unauthorized access to Gmail accounts, which can result in data breaches, identity theft, and lateral movement within organizations. The use of Zoom as the initial trust vector is notable given its widespread adoption for remote collaboration, increasing the likelihood of users encountering such phishing attempts.

Potential Impact

For European organizations, this phishing campaign poses a significant risk primarily through the compromise of Gmail credentials, which are often used for corporate email and access to Google Workspace services. Unauthorized access to these accounts can lead to data exfiltration, exposure of sensitive information, and further phishing or malware distribution within the organization. The use of Zoom as the initial vector is particularly impactful given the high adoption rates of Zoom for remote work across Europe, increasing the attack surface. Compromised credentials can also facilitate business email compromise (BEC) attacks, financial fraud, and reputational damage. Organizations relying heavily on Google services without enforced multi-factor authentication (MFA) are especially vulnerable. The campaign could disrupt business operations, lead to regulatory non-compliance under GDPR due to data breaches, and incur financial losses. Additionally, the psychological impact on employees and trust erosion in collaboration tools may affect productivity and security culture.

Mitigation Recommendations

To mitigate this threat, European organizations should implement targeted user awareness training focused on recognizing phishing attempts that exploit trusted platforms like Zoom. Enforce multi-factor authentication (MFA) on all Google Workspace accounts to prevent unauthorized access even if credentials are compromised. Deploy email and web gateway filters to detect and block phishing URLs, especially those mimicking legitimate services. Monitor login activity for anomalous behavior such as logins from unusual locations or devices. Encourage users to verify URLs carefully and avoid entering credentials on pages accessed via unsolicited links, even if they appear to be from trusted sources. Utilize endpoint protection solutions capable of detecting and blocking phishing payloads and suspicious WebSocket connections. Regularly review and update incident response plans to include phishing scenarios involving collaboration tools. Collaborate with Zoom and Google support channels to report phishing URLs and take down malicious content promptly. Finally, consider implementing domain-based message authentication, reporting, and conformance (DMARC) policies to reduce email spoofing risks.

Need more detailed analysis?Get Pro

Technical Details

Source Type
reddit
Subreddit
netsec
Reddit Score
1
Discussion Level
minimal
Content Source
reddit_link_post
Domain
blog.himanshuanand.com
Newsworthiness Assessment
{"score":31.1,"reasons":["external_link","newsworthy_keywords:rce,campaign,phishing campaign","non_newsworthy_keywords:job","established_author","very_recent"],"isNewsworthy":true,"foundNewsworthy":["rce","campaign","phishing campaign"],"foundNonNewsworthy":["job"]}
Has External Source
true
Trusted Domain
false

Threat ID: 68e663069e2ffba8db3c0645

Added to database: 10/8/2025, 1:11:34 PM

Last enriched: 10/8/2025, 1:11:49 PM

Last updated: 10/8/2025, 11:06:51 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats