Cybersecurity experts have successfully decrypted Zoom Team Chat data, revealing a wealth of information about user activities.
This achievement underscores the importance of digital forensics in uncovering hidden digital evidence.
The focus on Zoom Team Chat artifacts has shown that, despite encryption, crucial communications and shared files can be exposed through meticulous analysis.
The decryption was part of a CTF (Capture The Flag) challenge where participants were given a disk image to analyze.
The system had been hit by ransomware, encrypting many files and damaging registry data, complicating the search for artifacts.
However, using Windows jumplists and other execution artifacts, the team found clues pointing to a suspicious HTA file, hinting at obfuscated JavaScript requiring deobfuscation.
The investigation by InfoSec Writeups, involved analyzing Chrome browsing history and Discord chat logs, which led to a pair of Discord chats referencing Zoom communications.
This trail sparked interest in Zoom’s data storage practices, particularly the encrypted databases containing Zoom Team Chat information.
Zoom Data Storage
Zoom stores its application data in two encrypted databases:
# Example decryption script for encrypted fields in the main database
from Crypto.Cipher import AES
from Crypto.Hash import SHA256
from base64 import b64decode
main_key = "Main Key Here"
key = SHA256.new(main_key).digest() # Derive AES key from main_key
raw = b64decode("encrypted_field_value")
iv, tag, data = raw[1:13], raw[-16:], raw[19:-16] # Extract IV, authentication tag, and ciphertext
plaintext = AES.new(key, AES.MODE_GCM, iv).decrypt_and_verify(data, tag) # Decrypt and verify
print(plaintext.decode('utf-8'))
# Python script to derive the user_key for decrypting user-specific database
import hashlib
import base64
main_key = b'L4jYqZnRF/ZrwJuMcVvPOFqklFzqtMPj554VF82B9g' # First 42 bytes of main_key
kwk = b'nB9oO3Kg8XA+gzd6O+k8YMq+iGCpDmHAe9m0iqtJY3w='
h1 = hashlib.sha256(main_key).hexdigest()
h2 = hashlib.sha256(kwk).hexdigest()
final = hashlib.sha256(bytes.fromhex(h1 + h2)).digest()
print(base64.b64encode(final).decode())
The decryption of Zoom Team Chat data highlights the complexities and possibilities in digital forensic analysis.
While Zoom’s encryption measures are robust, combining forensic techniques with API monitoring can uncover crucial user activity data.
This breakthrough serves as a reminder of the potential vulnerabilities even in seemingly secure communication platforms and underscores the need for continued innovation in digital forensics.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
In recent security research, vulnerabilities in the Kentico Xperience CMS have come to light, highlighting…
A critical vulnerability, identified as CVE-2025-24016, has been discovered in the Wazuh Security Information and…
A series of vulnerabilities has been discovered in Espressif Systems' ESP32 devices, specifically affecting the…
Symantec's Threat Hunter Team has demonstrated how AI agents like OpenAI's Operator can now perform…
In a concerning escalation of cyber threats, the BlackLock ransomware group has executed a series…
A recent cybersecurity threat has emerged in the form of Android malware masquerading as the…