Thousands of Compromised Usernames and Passwords of Zoom Accounts Listed on Dark Web Forum

Cybercriminals continue to use the Coronavirus outbreak to launch various attacks such as malware, phishing, fraud, and disinformation campaigns.

In the current situation, most of the organization has been closed and the employees are provided with options to work from home. So the RDP and the video communication platforms usage will be high.

Attacks Targeting Zoom

Recently multiple vulnerabilities detected with Zoom client that allows attackers to steal the Windows password and to escalate privileges with macOS.

Researchers from IntSights discovered a shared database containing more than 2300 usernames and passwords to Zoom account in deep and dark web forums

The database includes details of Zoom accounts such as email and password, others included meeting IDs, names and host keys.

Along with Zoom credentials the database also includes data of “personal accounts, many corporate accounts were belonging to banks, consultancy companies, educational facilities, healthcare providers, and software vendors, amongst others.”

Also, several posts spotted asking for details on how to gain access into Zoom conferences, some threats focused on Zoom checkers and credential stuffing.

One user suggested a specific configuration of OpenBullet, the OpenBullet is a web testing suite that allows performing various tests on targeted web applications.

He further added that with the configuration users can capture meeting URL, host key, full name, meeting id, and account type.

FBI also warned users to stay awake in the COVID-19 crisis as the video-teleconferencing (VTC) hijacking emerges.

Users are recommended not to make the meetings public or don’t share the meeting links in social media and make sure that your meetings have a password enabled.

Zoom also recently makes a change that it will not display meeting ID on the title toolbar, instead title will be marked as Zoom.

Guru baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

  • Assuming we use SSO with Zoom, would that mean Zoom does not have our passwords on file? I have logged a ticket to be sure.

Recent Posts

Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence

Criminal IP, a renowned Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently signed a technology partnership…

2 hours ago

Scattered Spider Attacking Finance & Insurance Industries WorldWide

Hackers very frequently target the finance and insurance sectors due to the large volumes of sensitive data that they own.…

5 hours ago

Tycoon 2FA Attacking Microsoft 365 AND Google Users To Bypass MFA

Tycoon 2FA, a recently emerged Phishing-as-a-Service (PhaaS) platform, targets Microsoft 365 and Gmail accounts, which leverage an Adversary-in-the-Middle (AitM) technique…

5 hours ago

Logicalis Enhances Global Security Services with The Launch of Intelligent Security

Logicalis, the global technology service provider delivering next-generation digital managed services, has today announced the launch of Intelligent Security, a…

5 hours ago

Critical Cacti Vulnerability Let Attackers Execute Remote Code

Cacti, the widely utilized network monitoring tool, has recently issued a critical security update to address a series of vulnerabilities,…

5 hours ago

Nmap 7.95 released – What’s New!

Nmap's version 7.95 emerges as a testament to the relentless efforts of its development team, spearheaded by the renowned Gordon…

7 hours ago