Over 500,000 Zoom Accounts Sold On Hacker Forums, the Dark Web (bleepingcomputer.com) 23
An anonymous reader quotes a report from Bleeping Computer: Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free. These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers. Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each.
Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community. These accounts are shared via text sharing sites where the threat actors are posting lists of email addresses and password combinations. The purchased accounts include a victim's email address, password, personal meeting URL, and their HostKey. Cyble has told BleepingComputer that these accounts include ones for well-known companies such as Chase, Citibank, educational institutions, and more. You can use Have I Been Pwned and Cyble's AmIBreached to check if your email address has been leaked in a data breach.
Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community. These accounts are shared via text sharing sites where the threat actors are posting lists of email addresses and password combinations. The purchased accounts include a victim's email address, password, personal meeting URL, and their HostKey. Cyble has told BleepingComputer that these accounts include ones for well-known companies such as Chase, Citibank, educational institutions, and more. You can use Have I Been Pwned and Cyble's AmIBreached to check if your email address has been leaked in a data breach.
They are also sold ... (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
It takes ten minutes to get a password manager like Bitwarden and even less time to make a secure password with it.
Re: (Score:2)
How well does that work across multiple platforms like desktops, tablets, phones, office desktops and public kiosks?
Re: (Score:2)
Well in the case of Bitwarden you can log into it from your browser or phone.
Re: (Score:2)
Another Day... (Score:1, Redundant)
...another "Zoom is the wirst!" post. I wonder how much someone is getting paid to nail Zoom to the wall. From what I can see, Zoom's chief problem was it installs out of the box with lax security, but if you tighten it up, it doesn't look any worse than Skype, Microsoft Teams or Gotomeeting. But I'm not a shareholder in those other companies, so maybe I'm missing the big picture here, and that is that Zoom must be killed.
Re: Another Day... (Score:3, Insightful)
Ours did until recently when everyone was told to clean that shit up and password everything.
When we started using Zoom, I noticed the urls were static and occasionally someone would randomly join a meeting by mistake or a few times I joined my meeting early but the same url was being used by the host for a different meeting that hadn't ended yet.
This was
Right back at you (Score:2)
How many tighten it up?
To how many does it matter?
It's not like someone can secretly observe a Zoom chat, you can see if someone else is on.
Zoom bombing can be a thing only if you have a relative public URL, and if someone attempts to join and the person who started the Zoom does not know them, they simply are not let in.
For MOST people, what else needs "tightening"??
People who claim the default "tightening" is not enough, do not appear to have used Zoom.
Déjà vu? (Score:2)
Didn't I already see this earlier this morning?
Why is Zoom both bad and popular? (Score:1)
For a startup that has been around since 2011, they really don't have their shit together. Sure their software is pretty easy to use, but once they implement security features I'm going to guess it's going to stop being so easy to use.
Re: (Score:1)
Re: (Score:1)
It's why we had to make certain kinds of fireworks illegal.
Re: (Score:2)
Sure their software is pretty easy to use
That's why. Yes there are better services but it takes some techie skill to get going. I was surprised how easy it was to download and startup. Other programs always required some tweaking. For most people here that's no big deal, kind of like if you are an experienced skydiver then it's just a matter of putting on the rig, ride the "elevator" to 13K and exit. then do usual skydiving stuff. Give that to someone with no training and they will go nutzoid.
Time to nag (Score:1)
It's time for Zoom to nag their users with pop up boxes regarding security- "Are you really, really, REALLY sure you DON'T want to password protect your meeting? The bad guys can't wait to drop into your non-passworded meeting!"
Simple problem with a (mostly) simple solution.
Re: (Score:2)
Looks lik classic credential stuffing (Score:1)
Dear Bad Actors (Score:1)
I don't know whether you've gotten access to my Zoom account, but if you have, please enjoy any transcripts you find there from Ms. Z's second-grade class. I'm sure they'll be very helpful, and I look forward to getting my tablet back from my 8-year-old someday.
Profit? (Score:2)
1) Buy hacked Zoom credentials
2) Zoombomb a meeting
3) ????????
4) Profit
What's step three?
Re: (Score:2)
Misleading articles (Score:1)
That's only $5k (Score:2)
Really?! That's only a week of consulting fees for the average software engineer. Even if they find a buyer, it hardly seems worth the effort/risk.