Zoom app hacking issues
Looking for:
- Zoom app hacking issuesIs Zoom Secure? Breaking Down 10 Zoom Security Issues - InfoSec Insights
Zoom app hacking issues. Zoom Security Issues Are a Wakeup Call for Enterprises
Zoom app hacking issues.Zoom calls can be hacked by this weird flaw
There's one that mired with racial slurs a UCLA class on the history of the racial and cultural roots of Mexico. Another one disrupted an Arizona State University class on storytelling with pornographic videos. In Singapore, the Ministry of Education decided to ban Zoom for home-based teaching after hackers hijacked classes with explicit imagery.
Zoombombing has aggravated in the past weeks according to the New York Times, after analyzing dozens of Instagram and Twitter accounts as well as various 4Chan and Reddit boards. It has reportedly become a " dangerous concerted effort. They also share meeting passwords to allow other malicious parties to sow chaos.
Some may say that zoombombing is generally benign, because it does not result in serious cyber damage. Also, most attacks are perpetrated by bored people who have nothing better to do.
These include teenagers or students who target online classes because of their frustrations and rebellious tendencies. There are also others who do it to raise their social media engagement.
The attacks are often led by people who are out in the open. They even maintain public social media accounts referred to as Zoom raid accounts and unambiguously named as such. Some brag about their zoombombing attacks by streaming them on YouTube. In addition to zoombombing, there's also the usual hack attacks aimed at stealing login credentials. Recently, hundreds of verified Zoom accounts have been compromised with their details posted on a well-known dark web forum according to cyber intelligence firm Sixgill.
The account details siphoned include passwords, email addresses, host keys, meeting IDs, names, and the Zoom account types. The cybercriminal responsible for stealing the hundreds of Zoom accounts posted on April 1st a link to a collection of stolen Zoom accounts.
The post included a note saying that the cyber thief "worked really hard" to obtain the compromised accounts. A tweet from Sixgill says that one of the stolen Zoom accounts used to belong to a major healthcare provider in the United States. Another one was previously owned by a small business. Some seven others were identified to be once handled by different educational institutions. Sixgill deduced that the stolen accounts were being offered for trolling activities and to disrupt other users of Zoom.
No malware has been identified. There have been no schemes to defraud or commit other crimes detected.
So what do Zoom users need to do to prevent attacks? First, it's important to have all the basic security measures, specifically antivirus and malware protection tools. Most of the leading antiviruses at present come with advanced features that don't only detect and block malicious software from infecting devices. They also include tools that help address social engineering threats by scanning links for potential risks, so users are forewarned before they click on anything.
When it comes to zoombombing, the first thing to do is to update the Zoom app. All Rights Reserved Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation.
This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.
Jeff Burt. January 29, Both vulnerabilities were reported to Zoom, which fixed them on Nov. Next article Top Threat Intelligence Platforms for Jeff Burt Jeffrey Burt has been a journalist for more than three decades, the last plus years covering technology.
During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. Top Products. Top Cybersecurity Companies for March 10, Related articles. How One Company Survived Threats July 12, New Highly-Evasive Linux Threats July 11, New Quantum-safe Cryptogr Trends July 8, Advertise with Us.
Comments
Post a Comment