[NJTechDiv] attackers can use Zoom to attack you without warning

Mario Brusco mrb620 at hotmail.com
Sat Apr 4 15:49:27 UTC 2020


Attackers Can Use Zoom to Steal Users' Windows Credentials with No Warning
(https://arstechnica.com/information-technology/2020/04/unpatched-zoom-bug-lets-attackers-steal-windows-credentials-with-no-warning/)

DAN GOODIN, 4/1/2020, 12:38 PM.
(Dan is the Security Editor at Ars Technica, which he joined in 2012 
after working for The Register, the Associated Press, Bloomberg News, 
and other publications.)

Users of Zoom for Windows beware: the widely used software has a 
vulnerability that allows attackers to steal your operating system 
credentials, researchers said.

Discovery of the currently unpatched vulnerability comes as Zoom usage 
has soared in the wake of the coronavirus pandemic. With massive numbers 
of people working from home, they rely on Zoom to connect with 
co-workers, customers, and partners. Many of these home users are 
connecting to sensitive work networks through temporary or improvised 
means that don’t have the benefit of enterprise-grade firewalls found 
on-premises.

Protect yourself.

While the attack works only against Windows users, Hickey said attacks 
can be launched using any form of Zoom, again, by sending targets a UNC 
location in a text message. When Windows users click on the link while 
they’re connected to certain unsecured machines or networks, the Zoom 
app will send the credentials over port 445, which is used to transmit 
traffic related to Windows SMB and Active Directory services.

In the event that port 445 is closed to the Internet— either by a device 
or network firewall or through an ISP that blocks it— the attack won’t 
work. But it’s hardly a given that this egress will be closed on many 
Zoom users’ networks. The events of the past month have left millions of 
people working from home without the same levels of IT and security 
support they get when working on premises. That makes it more likely 
that port 445 is open, either because of an oversight or because the 
port is needed to connect to enterprise resources.

Zoom's statement didn't indicate when a fix will be in place. Until 
then, Windows users should be extra suspicious of chat messages that 
contain links. When possible, users should also ensure that port 445 is 
either blocked or can access only trusted addresses on the Internet.

Update: 4/2/2020 9:47 California time. On late Wednesday, Zoom officials 
said that the UNC bug and a separate pair of bugs disclosed by 
researcher Patrick Wardle had been fixed. The video conferencing company 
also said it was enacting a feature freeze for the next 90 days so it 
could focus on securing the features that are already in place.

some of the article has been left out for those who are not technically 
inclined to understand (or care about) the technical jargon. those who 
are interested can read more about it at the URL above. the conclusion 
is to make sure the Zoom client is up to date to the latest version.




More information about the NJTechDiv mailing list