banner



Zoom flaw could steal passwords and install malware: What to do now

Zoom flaw could steal passwords and install malware: What to do now

A video conference on a laptop screen.
(Image credit: Rawpixel.com/Shutterstock)

UPDATE April 2: Zoom says information technology has at present fixed this flaw .

A flaw in Zoom video-conferencing software lets hackers, pranksters and "Zoom bombers" steal your passwords or possibly even run malware past tricking you to click on a link in a Zoom meeting's chat window.

The problem is that Zoom doesn't distinguish between spider web URLs like, say, http://www.foobar.com, and another kind of network link called a Universal Naming Convention (UNC) path, which might look like \\www.foobar.com\evilstuff\evilfile.exe on Windows. (Note that while URL links use forrad slashes, UNC links use backward slashes.)

  • How to delete Zoom
  • Best free Zoom backgrounds
  • The all-time antivirus software to protect your PC

The UNC link volition ship your PC off on a quest to recollect files hosted on a remote server, which could be controlled by the jerk who posted the UNC link in your Zoom meeting's chat window. Your machine volition endeavour to log into the remote server using its Windows login credentials, and might try to run an application stored on the server.

What to exercise

To protect yourself, outset of all, don't click on links in Zoom chat windows that use backward slashes, and make sure that all the URLs you click on brainstorm with "http" or "https".

If you're tech-savvy, then go into your firewall settings and block outbound port 445. And install and run one of the best antivirus programs to catch any malware that might come through.

If you're hosting a Zoom meeting, do NOT brand the meeting ID public, and countersign-protect it if you take a way to communicate the password to meeting participants beforehand. That volition keep out miscreants who may effort to crash the meeting.

How the assault works

If an attacker posted a UNC link in a Zoom meeting chat window, and you as a Zoom user clicked on the latter, and your Windows reckoner or firewall allowed network sharing over the internet, then your computer would try to admission the designated files on the server at foobar.com using the Server Message Cake (SMB) file-sharing protocol.

Your computer would attempt to log into the foobar.com server by sending your Windows username and a weakly encrypted grade of your Windows password to the remote server.

That password might be encrypted using the Windows NTLM algorithm, which is very like shooting fish in a barrel to "cleft" to derive the actual password. If so, then the jerk who posted the UNC link can at present log into your computer.

And if the UNC file path led to an awarding or other executable file on the foobar.com server, and so the application -- which could easily be malware -- might open and run on your auto. You will likely get a warning popular-up from Windows that software from the internet is nearly to run, but many people would click "OK." The jerk who has your Windows login credentials could employ that malware to remotely access your calculator.

Video demonstration

This video, posted on YouTube by Mohamed A. Baset, shows a Mac on the left side of the screen participating in a Zoom coming together with a Mac running a Windows emulator on the correct side of the screen. The Mac sends a UNC link pointing to the application "payload.exe" in the Zoom conversation window.

The Windows user clicks on the link and, while Zoom initially hangs, it somewhen opens the payload -- a lightweight network-interface program called PuTTY -- on the Windows virtual machine. That's non a malicious application, just it could take been.

We haven't tried to duplicate Baset'southward attack, and to our knowledge no 1 else has replicated it all the same, but we can't imagine why it wouldn't work. We asked Baset via Twitter to clarify that this could indeed be a malware attack, and he replied that it was.

Twitter exchange

This flaw in Zoom was commencement noticed on March 23 by Twitter user @_g0dmode, only it didn't actually get attention until yesterday (March 31), when Twitter user @hackerfantastic posted a screenshot of the exploit in activity and alerted Zoom and the U.K.'due south National Cyber Security Eye.

See more

Post-obit up on @hackerfantastic's tweet, Baset (@SymbianSyMoh) put up his YouTube video showing the same exploit forcing the targeted automobile to open a remote application.

Not anybody on infosec Twitter was and then impressed. Amit Serper (@0xAmit), vice president of security strategy at Boston security firm Cybereason, noted that the user would take to click on the UNC link and that the same flaw exists in Windows Explorer, the default Microsoft Os file manager.

See more

Another Twitter user replying to Serper imagined that a lot of residential Net Service Providers likely block outbound port 445 -- used by SMB -- by default, negating the attack vector for this exploit.

However, that'south not a given, and you can bet that jerks worldwide volition be trying to use this exploit to set on Zoom users in public meetings starting today.

Security gloom might doom Zoom boom

This is just another embarrassing security or privacy revelation for Zoom, whose skyrocketing use during the coronavirus work-from-home lockdown has sent its stock soaring but has also focused the information-security earth's attention on its shortcomings. Many people are now looking for Zoom alternatives.

In the past week, we've learned that anyone can "bomb" a public Zoom meeting; that Zoom sent iOS user profiles to Facebook; that Zoom's "stop-to-end" encryption is anything only; that it uses hacker-like methods to featherbed normal macOS security precautions;  that Zoom automatically puts everyone sharing the same email domain into a "company" binder where they tin can see each other's information; and that Zoom'south privacy policy (since revised) gave it the right to share your personal data with advertisers.

Meanwhile, thousands of Zoom-related domains have been registered in the by calendar week, indicating that malicious hackers and other online criminals are planning to flop Zoom users with phishing scams and malware.

"This week is going to be a critical 1 for Zoom and $ZM shareholders," wrote sometime Facebook and Yahoo security chief Alex Stamos on Twitter yesterday. "This is going to get worse, as the entire infosec world descends on a spectacularly complicated product with lots of attack surface and some sketchy blueprint trade-offs.

"Zoom is going to demand to demonstrate more transparency," Stamos added. "A documented xxx twenty-four hours security plan that includes a feature freeze, several professional person pen-tests and rolling out coordinated disclosure policies would be smart."

Encounter more

Paul Wagenseil is a senior editor at Tom'southward Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul commuter, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random Idiot box news spots and even moderated a panel discussion at the CEDIA home-technology conference. Yous can follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/zoom-password-malware-flaw

Posted by: fryesmusbuty.blogspot.com

0 Response to "Zoom flaw could steal passwords and install malware: What to do now"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel