• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Coronavirus • Security  /  How safe it is to use the Zoom video-conferencing app?
How safe it is to use the Zoom video-conferencing app?
17 April 2020

How safe it is to use the Zoom video-conferencing app?

Written by Sanjay Katkar
Sanjay Katkar
Coronavirus, Security

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned users about the vulnerabilities in the Zoom app.

In the current situation of lockdown due to Coronavirus pandemic, people are forced to work from home — they are using various communication and video conferencing apps to stay in touch and perform work from home activities. As such, Zoom, being one of the oldest available applications for video conferencing, is quite popular among its users. This current pandemic situation has made it all the more popular among millions of people worldwide.

This increased use of zoom has attracted the attention of cybercriminals and is being targeted by hackers the world over. Zoom application has a bad history of security flaws in its applications and the platform. In the past too, there have been a few serious security flaws discovered within the application.

What is the problem?

Recently in the past 2 months, there have been a few instances of serious vulnerabilities being reported in Zoom video conferencing software. The flaws such as UNC Path injection and SMBRelay techniques have made it riskier. The kind of attack that hackers are performing exploiting these flaws can compromise your Windows PC to steal login credentials of your computer, steal information from it and much more.

Amid this situation, it was also discovered by another hacker that Zoom’s iOS app sends users’ device information with Facebook, raising privacy concerns.

Recently during March-end, it was discovered that attackers have developed an automated tool called zWarDial which helps automate scanning of ongoing zoom meetings. Their goal is to find out meetings with no or weak passwords and enable access to these meetings for unauthorized attendees. With this tool easily available (sold on the dark web) there has been a surge in ‘ZoomBombing’ of meetings in the past 2 weeks — ZoomBombing is the term used when an individual gets the ability to hijack an ongoing meeting on the Zoom video-conferencing app.

Recently, there was news that 5,00,000 Zoom video conferencing user names and passwords were available on the dark web for sale.

In the current situation is it safe to use the Zoom video-conferencing app?

With so much attention by the hacking community, there has been sleeve of attacks on Zoom software with news about Zoom vulnerabilities and exploits being sold off the dark web for a few thousand dollars. Hence, with so much happening around this video conferencing software, it is advisable to be very cautious while using Zoom.

Please follow the below steps:

  • Ensure that you update your Zoom application on the PC as well as the app on mobile devices with the latest versions.
  • Make sure you set a strong password for any zoom meetings that you schedule.
  • Don’t share zoom meeting links over social media.
  • Always end the meeting call and close the meeting — don’t just leave the meeting after it is over.
  • Leverage on robust cybersecurity products to avoid cyberattacks (QH)
  • Leverage on robust cybersecurity products to avoid cyberattacks (Seqrite)

Zoom guys have released patches/fixes for most of the reported vulnerabilities.

With the rise in the use of video conferencing software, hackers are going to target such platforms more aggressively. No matter what video conferencing software you use, you have to be proactive about having strong passwords set and about using the latest updated software of the same. Also, having good security software installed and updated on your PCs and phones helps hugely to counter such attacks.  

 Previous PostIs the Coronavirus also indirectly endangering your enterprise da...
Next Post  Java RAT Campaign Targets Co-Operative Banks in India
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has...

Articles by Sanjay Katkar »

Related Posts

  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
  • How the Recent Health Insurance Data Breach Could Affect You – and What You Can Do About It

    October 14, 2024
  • Defending against APT attacks with endpoint security

    How To Defend Against Advanced Persistent Threats (APTs): A Comprehensive Approach

    September 27, 2024
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies