Article 51JBY Attackers can use Zoom to steal users’ Windows credentials with no warning

Attackers can use Zoom to steal users’ Windows credentials with no warning

by
Dan Goodin
from Ars Technica - All content on (#51JBY)
zoom-meeting-800x600.jpg

Enlarge (credit: Christopher Blizzard)

Users of Zoom for Windows beware: the widely used software has a vulnerability that allows attackers to steal your operating system credentials, researchers said.

Discovery of the currently unpatched vulnerability comes as Zoom usage has soared in the wake of the coronavirus pandemic. With massive numbers of people working from home, they rely on Zoom to connect with co-workers, customers, and partners. Many of these home users are connecting to sensitive work networks through temporary or improvised means that don't have the benefit of enterprise-grade firewalls found on-premises.

Embed network location here

Attacks work by using the Zoom chat window to send targets a string of text that represents the network location on the Windows device they're using. The Zoom app for Windows automatically converts these so-called universal naming convention strings-such as \\attacker.example.com/C$-into clickable links. In the event that targets click on those links on networks that aren't fully locked down, Zoom will send the Windows usernames and the corresponding NTLM hashes to the address contained in the link.

Read 10 remaining paragraphs | Comments

index?i=52-Sa1RmMVY:Bj4okdppNgA:V_sGLiPB index?i=52-Sa1RmMVY:Bj4okdppNgA:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments