sb-as logo
Story image

Zoom meetings infiltrated by hackers - Check Point

Check Point Research identified a major security flaw in Zoom, the video conferencing service used by over 60% of the Fortune 500. 

Check Point’s researchers were able to prove that hackers could easily generate and verify Zoom Meeting IDs to target victims, enabling a hacker to eavesdrop on Zoom meetings, giving them intrusive access to all audio, video and documents shared throughout the duration of the meeting.

Guessing Zoom meeting IDs

Zoom meeting IDs are access points for Zoom meeting participants. Typically, these ID numbers comprise of 9, 10 and 11-digit numbers.

Researchers at Check Point learned that a hacker could pre-generate a long list of Zoom Meeting ID numbers, use automation techniques to quickly verify if a respective Zoom Meeting ID was valid or not, and then gain entry into Zoom meetings that were not password protected. 

Researchers found that around 4% of their randomly-generated meeting IDs led to a genuine Zoom meeting ID.

Eavesdropping in three easy steps

In summary, a hacker could eavesdrop into a Zoom meeting by following three easy steps:

  1. Generate a list of Zoom Meeting IDs
  2. Quickly validate the existence of each Zoom Meeting ID
  3. Connect to the meeting.

Check Point first contacted Zoom on July 22, 2019 and shared these findings as part of its standard responsible disclosure process.

Check Point subsequently worked with Zoom to issue out a series of fixes and new functionality to fully patch the security flaws Check Point discovered.

Zoom’s security changes 

As a result of Check Point’s disclosure, Zoom introduced the following security features and functionalities into its technology:

  1. Default passwords: Passwords are added by default to all future scheduled meetings.
     
  2. Password additions by user: Users can add a password to already-scheduled future meetings.
     
  3. Account and group level password enforcement: Password settings are enforceable at the account level and group level by the account admin.
     
  4. Meeting ID validation: Zoom will no longer automatically indicate if a meeting ID is valid or invalid. For each attempt, the page will load and attempt to join the meeting. Thus, a bad actor will not be able to quickly narrow the pool of meetings to attempt to join.
     
  5. Device blocker: Repeated attempts to scan for meeting IDs will cause a device to be blocked for a period of time.
Link image
How to head off a rise in DDoS attacks
Many businesses invest in costly DDoS mitigation and protection solutions, but few test them. NCC Group tests all environments and is one of only two AWS DDoS Test Partners. Claim 10% off your next DDoS service today.More
Story image
Cybersecurity market continues meteoric ascent
With the increase in cyberattacks, organisations are continuing to spend more money on security. However, without a focused cybersecurity strategy, they often spend it in the wrong areas.More
Story image
Palo Alto Networks extends cloud native security platform with new modules
Palo Alto Networks has announced the availability of Prisma Cloud 2.0, including four new cloud security modules, thus extending its Cloud Native Security Platform (CNSP). More
Story image
Report reveals relationship between boardroom and cybersecurity investments
“While boards are definitely listening and stepping up with increased budget for cybersecurity, they tend to view any investment as a cost rather than adding business value."More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
NordVPN upgrades infrastructure with launch of colocated servers
"The greatest advantage of having colocated servers is their complete ownership, which guarantees access only by our authorised people."More