Zoom Notes Phishing Abuse: How Attackers Exploit a Trusted Brand to Deliver Legitimate-Looking…
研究人员发现一种利用Zoom和Gmail进行钓鱼攻击的技术:攻击者通过Zoom“Notes”功能创建诈骗内容并分享至Gmail地址,再利用Gmail自动转发功能将邮件发送至多个目标邮箱。由于邮件来自[email protected]且SPF、DKIM、DMARC验证均通过,因此极具欺骗性。此类攻击通常引导受害者拨打诈骗电话以实施进一步欺诈。建议企业配置邮件流规则、提高员工安全意识并及时报告滥用行为以防范此类威胁。
2025-9-2 10:2:6
Author: infosecwriteups.com(查看原文)
阅读量:17
收藏
In a recent investigation, our team uncovered and successfully replicated a sophisticated phishing technique that leverages Zoom’s own infrastructure to send seemingly legitimate emails from [email protected]. This method abuses Zoom’s “Notes” feature and Gmail’s auto-forwarding functionality to bypass sender limits and email security controls. Here’s how it works, why it’s effective, and how to defend against it.
The Exploit in Action
Step-by-Step Breakdown:
Zoom Notes Abuse: An attacker creates or compromises a Zoom account (free or paid). They create a new Zoom Note with scam content (e.g., fake payment confirmation, invoice details, or tech support callback numbers). The note is shared via Zoom’s built-in “Share via Email” feature to an external Gmail address.
Legitimate Zoom Infrastructure Used: The resulting email is sent directly from [email protected] via SendGrid. SPF, DKIM, and DMARC all pass, as it originates from Zoom’s authenticated platform.
Bypassing Limits with Gmail Forwarding: The Gmail account (e.g., [email protected]) is configured to auto-forward emails to many recipients. This bypasses Zoom’s daily send limits for external recipients. The forwarded email preserves original headers, making it appear as though Zoom sent the email directly to the target.
How I Investigated and Replicated It
After receiving a suspicious email appearing to come from [email protected], I began the investigation by inspecting the full message headers. Here’s what we found:
SPF, DKIM, and DMARC all passed, confirming the message originated from Zoom’s legitimate infrastructure.
The original recipient was [email protected], not an internal corporate address.
The message was forwarded through Gmail, as evidenced by the presence of unverified-forwarding.1e100.net in the header chain.
The final recipient was our internal user, showing the forwarded message retained its original headers and authenticated sender.
Press enter or click to view image in full size
To replicate the attack, I:
Created a Zoom Basic account.
Composed a Zoom Note with scam-style language (e.g., fake payment and invoice confirmation).
Used Zoom’s “Share via Email” feature to send it to a test Gmail account.
Press enter or click to view image in full size
4. Configured Gmail to automatically forward the message to a corporate inbox.
Subject: Thank You — Your Payment Has Been Processed
Body:
"Thank you for your Zoom Webinar 500 Plan payment of $298.75. Invoice number: E50622. The transaction was completed using PayPal. If this wasn't you, call +1 (831) 210–2680 for support."
In this case, the goal of the message wasn’t to deliver malware or capture credentials through a phishing link. Instead, the attackers used a legitimate-looking email to prompt the recipient to call a phone number. This is a classic callback phishing technique, where the scam continues over the phone — often resulting in social engineering, remote access scams, or fraudulent payments.
This phishing technique is a powerful example of how trusted platforms can be repurposed into delivery mechanisms for scams. Because the message is technically legitimate and properly authenticated, it bypasses many traditional security filters.
Organizations must combine strong content filtering, behavior-based detection, and user education to stay protected against these kinds of threats.
Would you have spotted this scam if it landed in your inbox?