• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Coronavirus • Security  /  How safe it is to use the Zoom video-conferencing app?
Zoom video-conferencing app becoming an attack channel
17 April 2020

How safe it is to use the Zoom video-conferencing app?

Written by Sanjay Katkar
Sanjay Katkar
Coronavirus, Security
Estimated reading time: 3 minutes

Recently the Union home ministry has issued a warning raising a red flag for users of Zoom video-conferencing application and marked it as unsafe to use. Earlier, during the end of March, CERT-IN, India’s nodal cybersecurity agency had warned users about the vulnerabilities in the Zoom app.

In the current situation of lockdown due to Coronavirus pandemic, people are forced to work from home — they are using various communication and video conferencing apps to stay in touch and perform work from home activities. As such, Zoom, being one of the oldest available applications for video conferencing, is quite popular among its users. This current pandemic situation has made it all the more popular among millions of people worldwide.

This increased use of zoom has attracted the attention of cybercriminals and is being targeted by hackers the world over. Zoom application has a bad history of security flaws in its applications and the platform. In the past too, there have been a few serious security flaws discovered within the application.

What is the problem?

Recently in the past 2 months, there have been a few instances of serious vulnerabilities being reported in Zoom video conferencing software. The flaws such as UNC Path injection and SMBRelay techniques have made it riskier. The kind of attack that hackers are performing exploiting these flaws can compromise your Windows PC to steal login credentials of your computer, steal information from it and much more.

Amid this situation, it was also discovered by another hacker that Zoom’s iOS app sends users’ device information with Facebook, raising privacy concerns.

Recently during March-end, it was discovered that attackers have developed an automated tool called zWarDial which helps automate scanning of ongoing zoom meetings. Their goal is to find out meetings with no or weak passwords and enable access to these meetings for unauthorized attendees. With this tool easily available (sold on the dark web) there has been a surge in ‘ZoomBombing’ of meetings in the past 2 weeks — ZoomBombing is the term used when an individual gets the ability to hijack an ongoing meeting on the Zoom video-conferencing app.

Recently, there was news that 5,00,000 Zoom video conferencing user names and passwords were available on the dark web for sale.

In the current situation is it safe to use the Zoom video-conferencing app?

With so much attention by the hacking community, there has been sleeve of attacks on Zoom software with news about Zoom vulnerabilities and exploits being sold off the dark web for a few thousand dollars. Hence, with so much happening around this video conferencing software, it is advisable to be very cautious while using Zoom.

Please follow the below steps:

  • Ensure that you update your Zoom application on the PC as well as the app on mobile devices with the latest versions.
  • Make sure you set a strong password for any zoom meetings that you schedule.
  • Don’t share zoom meeting links over social media.
  • Always end the meeting call and close the meeting — don’t just leave the meeting after it is over.
  • Leverage on robust cybersecurity products to avoid cyberattacks (QH)
  • Leverage on robust cybersecurity products to avoid cyberattacks (Seqrite)

Zoom guys have released patches/fixes for most of the reported vulnerabilities.

With the rise in the use of video conferencing software, hackers are going to target such platforms more aggressively. No matter what video conferencing software you use, you have to be proactive about having strong passwords set and about using the latest updated software of the same. Also, having good security software installed and updated on your PCs and phones helps hugely to counter such attacks.  

 Previous PostIs the Coronavirus also indirectly endangering your enterprise da...
Next Post  Java RAT Campaign Targets Co-Operative Banks in India
Sanjay Katkar
About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University...

Articles by Sanjay Katkar »

Related Posts

  • Is accelerating enterprise digital transformation leading to cyberthreats?

    Is accelerating enterprise digital transformation leading to cyberthreats?

    November 25, 2020
  • Could rising unemployment lead to an increase in cybercrimes?

    Could rising unemployment lead to an increase in cybercrimes?

    November 6, 2020
  • Is your Router exposed to cyber threats

    Is your router exposed to cyber threats? Here is how to safeguard it.

    July 30, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Benefits of having Intrusion Prevention/Detection System in your enterprise Benefits of having Intrusion Prevention/Detection System in your enterprise February 15, 2018
  • 5 Security measures you should take to protect your organization’s network 5 Security measures you should take to protect your organization’s network August 11, 2017

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021
  • How can EdTech companies deal with rising security challenges?

    How can EdTech companies deal with rising security challenges?

    December 24, 2020

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (274) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (54) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.