New Zoom Hack Lets Hackers Compromise Windows and Its Login Password

No doubt, Zoom is an efficient online video meeting solution that’s helping people stay socially connected during these unprecedented times, but it’s still not the best choice for everyone—especially those who really care about their privacy and security.

According to cybersecurity expert UNC path injection‘ vulnerability that could allow remote attackers to steal victims’ Windows login credentials and even execute arbitrary commands on their systems.

Such attacks are possible because Zoom for Windows supports remote UNC paths that convert potentially insecure URIs into hyperlinks when received via chat messages to a recipient in a personal or group chat.

Hacking Zoom to Steal Windows Passwords Remotely

Confirmed by researcher

To steal Windows login credentials of a targeted user, all an attacker needs to do is sent a crafted URL (i.e., \\x.x.x.x\abc_file) to a victim via a chat interface.

Once clicked, the attack would eventually allow the attacker-controlled SMB share to automatically capture authentication data from Windows, without the knowledge of the targeted user.

To be noted, the captured passwords are not plaintext; instead, NTLM hashes of them, but a weak one can easily be cracked in seconds using password cracking tools like HashCat or John the Ripper.

In a shared environment, like office space, stolen Windows login credentials can be reused immediately to compromise other users or IT resources, and launch further attacks.

Exploiting Zoom to Compromise Windows Systems Remotely

Besides stealing Windows credentials, the flaw can also be exploited to launch any program already present on a targeted computer or execute arbitrary commands to compromise it remotely,

As shown, Ormandy demonstrated how the UNC path injection flaw in Zoom can also be exploited to run a batch script—without a prompt—containing malicious commands when called from the Windows default download directory.

The second attack scenario relies on the fact that browsers running on Windows operating system automatically save downloaded in a default folder, which can be abused to first trick a user into downloading the batch script and then triggering it using the zoom bug.

To be noted, to exploit this issue, an attacker must be aware of the Windows username for the targeted user, which, however, can easily be obtained using the first SMBRelay attack.

In addition, another security researcher going by the name ‘

What Should Zoom Users Do?

Zoom has already been notified of this bug, but since the flaw has not yet been patched, users are advised to either use an alternative video conferencing software or Zoom in their web browsers instead of installing a dedicated client app on their systems.

(Update: A day after we published this report, Zoom apologies for falling short of privacy and security expectations and

Some of the best alternative video conferencing and chat software are:

  • Skype & Microsoft Teams (up to 50 participants)
  • Google Hangouts Meet (up to 250 participants)
  • Google Duo
  • Jitsi (free, self-host, open source, up to 75 participants)
  • FaceTime and Signal for privacy

Besides using a strong password, Windows users can also change the

More Zoom-related Security and Privacy Incidents

This is not the only issue to have been uncovered in Zoom video conferencing software over the past couple of days, raising privacy and security concerns among millions of users.

The FBI is warning zoom users of the “

Just yesterday, another report confirmed that

Last week, Zoom

Earlier this year, Zoom also patched

Found this article interesting ? Follow THN on Facebook Twitter and LinkedIn to read more single content we post.

rapid climb has been there for nine years, but the contiguous necessity of an easy-to-use television conferencing app during the coronavirus pandemic nightlong made it one of the most darling communication instrument for millions of people around the globe.No doubt, Zoom is an effective on-line video recording meet solution that ‘s helping people stay socially connected during these unprecedented times, but it ‘s still not the best option for everyone—especially those who truly care about their privacy and security.According to cybersecurity technical @ _g0dmode, the Zoom video conferencing software for Windows is vulnerable to a authoritative ” vulnerability that could allow distant attackers to steal victims ‘ Windows login credentials and tied execute arbitrary commands on their systems.Such attacks are possible because Zoom for Windows supports remote UNC paths that convert potentially insecure URIs into hyperlinks when received via new world chat messages to a recipient role in a personal or group chat.Confirmed by research worker Matthew Hickey and demonstrated by Mohamed Baset, the first attack scenario involves the SMBRelay technique that exploits the fact that Windows mechanically exposes a user ‘s login username and NTLM password hashes to a distant SMB server when attempting to connect and download a file hosted on it.To steal Windows login credentials of a target exploiter, all an attacker needs to do is sent a craft URL ( i.e., \\x.x.x.x\abc_file ) to a victim via a old world chat interface.Once clicked, the attack would finally allow the attacker-controlled SMB parcel to automatically capture authentication data from Windows, without the cognition of the target user.To be noted, the capture passwords are not plaintext ; alternatively, NTLM hashes of them, but a unaccented one can easily be cracked in seconds using password crack tools like HashCat or John the Ripper.In a shared environment, like office space, stolen Windows login credentials can be reused immediately to compromise other users or IT resources, and plunge foster attacks.Besides stealing Windows credentials, the flaw can besides be exploited to launch any plan already stage on a target computer or execute arbitrary commands to compromise it remotely, confirmed by Google security system research worker Tavis Ormandy.As shown, Ormandy demonstrated how the UNC path injection flaw in Zoom can besides be exploited to run a batch script—without a prompt—containing malicious commands when called from the Windows default option download directory.The second attack scenario relies on the fact that browsers running on Windows operating organization mechanically save downloaded in a default folder, which can be abused to first trick a user into downloading the batch script and then triggering it using the soar bug.To be noted, to exploit this issue, an attacker must be aware of the Windows username for the target exploiter, which, however, can easily be obtained using the first SMBRelay attack.In accession, another security research worker going by the appoint ‘ pwnsdx ‘ on Twitter shared another antic with The Hacker News that could let attackers hide malicious links when displayed at the recipients ‘ end, potentially making it look more convert and practical.Zoom has already been notified of this microbe, but since the flaw has not so far been patched, users are advised to either use an alternative video conferencing software or soar in their web browsers alternatively of installing a dedicate client app on their systems.A day after we published this report, Zoom apologies for falling short of privacy and security expectations and released an update translation if it software to patch recently reported multiple security issues, including UNC way injection. ) Some of the best alternate video conferencing and new world chat software are : Besides using a firm password, Windows users can besides change the security policy settings to restrict the operate system from mechanically passing their NTML credentials to a distant SMB server.This is not the merely issue to have been uncovered in Zoom video conferencing software over the past pair of days, raising privacy and security concerns among millions of users.The FBI is warning soar users of the “ Zoom-Bombing “ attack after some people find a room to sneak their way into unsuspecting meetings and on-line gatherings and bombarded them with pornographic images or racist comments.Just yesterday, another report confirmed that Zoom does n’t use throughout encoding to protect calling data of its users from prying eyes despite telling users that “ Zoom is using an end to end code joining. “ survive week, Zoom updated its io app after it was caught sharing users ‘ device information with Facebook, raising lawful concerns over users ‘ privacy.Earlier this year, Zoom besides patched another privacy hemipterous insect in its software that could have let uninvited people join private meetings and remotely eavesdrop on private audio, video, and documents shared throughout the session.

source : https://thefartiste.com
Category : Tech

About admin

I am the owner of the website thefartiste.com, my purpose is to bring all the most useful information to users.

Check Also

articlewriting1

Manage participants in a zoom meeting webinar

Call the people who attend the meet as follows Alternate host host Who scheduled the …

Leave a Reply

Your email address will not be published.