Skip to main content

Zoom Critical Vulnerability by GAIS Cyber Security


With the COVID-19 pandemic, social life standards and habits have changed rapidly in the world, while different needs have emerged in the corporate and private sectors. At the beginning of these needs, in the face of this extraordinary situation, it directed the companies to video conference applications in order to get a quick reaction and normalize their business processes.

It has been determined by Gais CERT and Gais Cyber Intelligence that more than 500.000 personal and corporate Zoom accounts were leaked on Dark Web and illegal forum sites. While some of the leaked accounts were made accessible to everyone, some of them were sold for a fee.

Zoom application has been analyzed by the Gais Security to demonstrate that it is a common video conference application that is popular in many sectors in order to meet the needs of the companies and what are the risks of using these solutions will pose in possible security breaches. The vulnerability resulting from the analysis was shared with the Zoom officials and a $1000 award was given.


All details regarding the vulnerability detected in the analysis made by the Gais Security were shared with Zoom officials and the related vulnerability was quickly fixed. However, since the measures taken did not ensure the security of the meetings previously created, the report was shared with the end-user security in mind and in order to dimension the risk. Sharing the details of the vulnerability with the Zoom company officials by the Gais Security prevented the data of hundred thousands of users from leaking.


It was determined that detailed information about random id numbers generated by users called as "Personal Meeting" and "Other Meeting" or in randomly generated id numbers can be extracted in a directory we detected by applying fuzzing operations in the web service of the Zoom application.

Other Meeting 

In this category, it has been determined that the subject parts of the meeting rooms that are live or past, the UserId number of the user who created it and the “meeting endpoint” information in the user's local database are accessed.


Personal Meeting 

In this category, it was observed that Zoom application caused sensitive data disclosure due to the lack of mandatory password usage while creating the security architecture. As a result of fuzzing “Personal Meeting” numbers produced with random numbers between 9 and 11 digits, it was determined that the passwords of the future meeting records, in which users are assigned as “Schedule Meeting” were accessed. In brute force attacks on meeting id values at the relevant address, meeting information and password information for hundred thousands of personal and corporate accounts were accessed.



We can list the security measures taken with the notification of the related weakness as follows;
 • Assigning a password to the “Personal Meeting” id number when a new user is created after May.
• Mandatory password assignment when creating “Schedule Meeting”.
• New users who attend the meetings are not included in the video conference system until being approved by the moderator.
• Applying masking process to sensitive information on the web application.

It has been reported to Zoom officials that this detected security vulnerability continues to affect hundreds of thousands of users, which opened before May and did not assign passwords to "Personal Meeting" addresses.

The report was taken from: https://gaissecurity.com/

Comments

Popular posts from this blog

Google can now help you figure out that song stuck in your head - all you have to do is hum (or whistle) into your phone

  Google just launched its “hum to search” feature, which allows users to hum, whistle, or sing for 10–15 seconds in order to identify a song. The feature currently works in 20 languages, and Google hopes to add more. Google has finally launched the perfect feature for when a song is stuck in your head but you don’t know any of the words. “Hum to search” launched today on both the Google app for iOS and Android, according to Google’s blog, The Keyword. Users can also whistle or sing directly into the mic to identify a song. The technology works like this: the user can hum (whistle, or sing) for 10–15 seconds, and then Google’s technology takes the song’s melody and turns it into a numbers-based sequence. From there, the sequence can be used to “identify songs based on a variety of sources, including humans singing, whistling or humming, as well as studio recordings,” according to Google’s announcement. The sequence also strips away any other outside noise, like accompanying instru...

Ransomware's Dangerous New Trick Is Double-Encrypting Your Data

  Ransomware groups have always taken a more-is-more approach . If a victim pays a ransom and then goes back to business as usual-hit them again. Or don’t just encrypt a target’s systems; steal their data first, so you can threaten to leak it if they don’t pay up. The latest escalation? Ransomware hackers who encrypt a victim’s data twice at the same time. Double-encryption attacks have happened before, usually stemming from two separate ransomware gangs compromising the same victim at the same time. But antivirus company Emsisoft says it is aware of dozens of incidents in which the same actor or group intentionally layers two types of ransomware on top of each other. “The groups are constantly trying to work out which strategies are best , which net them the most money for the least amount of effort,” says Emsisoft threat analyst Brett Callow. “So in this approach you have a single actor deploying two types of ransomware. The victim decrypts their data and discovers it’s not act...

WhatsApp Users Exchanged Over 100 Billion Messages on New Year’s Eve, A New Record

WhatsApp is one of the most widely used communication apps on the planet and as such, clocks an insane number of messages and media exchanges on a daily basis. But the New Year's Eve broke a record that has been standing since WhatsApp's debut a decade ago. WhatsApp has revealed that users exchanged over 100 billion messages on New Year's eve. And out of that number, more than 20 billion messages were shared by Indian users alone. Moreover, around 12 billion out of the 100 billion+ messages shared on the platform were images. WhatsApp wrote in a press release that over 100 billion messages were shared globally on December 31 in the 24-hour duration leading up to the midnight of New Year's Eve. This is a record-breaking volume and is the highest number of messages exchanged in a single day ever since WhatsApp kicked off its services ten years ago. Out of those 100 billion+ messages shared on New Year's eve, WhatsApp says over 12 billion were images. Meanwhile...