Thousands of Compromised Usernames and Passwords of Zoom Accounts Listed on Dark Web Forum

Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

In the current situation, most of the organization has been closed and the employees are provided with options to work from home. So the RDP and the video communication platforms usage will be high.

Attacks Targeting Zoom

Recently multiple vulnerabilities detected with Zoom client that allows attackers to steal the Windows password and to escalate privileges with macOS.

Researchers from IntSights discovered a shared database containing more than 2300 usernames and passwords to Zoom account in deep and dark web forums

The database includes details of Zoom accounts such as email and password, others included meeting IDs, names and host keys.

Along with Zoom credentials the database also includes data of “personal accounts, many corporate accounts were belonging to banks, consultancy companies, educational facilities, healthcare providers, and software vendors, amongst others.”

Also, several posts spotted asking for details on how to gain access into Zoom conferences, some threats focused on Zoom checkers and credential stuffing.

One user suggested a specific configuration of OpenBullet, the OpenBullet is a web testing suite that allows performing various tests on targeted web applications.

He further added that with the configuration users can capture meeting URL, host key, full name, meeting id, and account type.

FBI also warned users to stay awake in the COVID-19 crisis as the video-teleconferencing (VTC) hijacking emerges.

Users are recommended not to make the meetings public or don’t share the meeting links in social media and make sure that your meetings have a password enabled.

Zoom also recently makes a change that it will not display meeting ID on the title toolbar, instead title will be marked as Zoom.

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

  • Assuming we use SSO with Zoom, would that mean Zoom does not have our passwords on file? I have logged a ticket to be sure.

Recent Posts

Norway Recommends Replacing SSLVPN/WebVPN to Stop Cyber Attacks

A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…

2 days ago

New Linux Backdoor Attacking Linux Users Via Installation Packages

Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…

2 days ago

ViperSoftX Malware Uses Deep Learning Model To Execute Commands

ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…

2 days ago

Santander Data Breach: Hackers Accessed Company Database

Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…

2 days ago

U.S. Govt Announces Rewards up to $5 Million for North Korean IT Workers

The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…

2 days ago

Russian APT Hackers Attacking Critical Infrastructure

Russia leverages a mix of state-backed Advanced Persistent Threat (APT) groups and financially motivated cybercriminals to achieve its strategic goals,…

2 days ago