UnknownSouljer
[H]F Junkie
- Joined
- Sep 24, 2001
- Messages
- 8,279
UPDATE 2020-04-17: Zoom hires a bunch of security experts to help fix zero day exploits.
https://www.thefpsreview.com/2020/0...-exploits-as-hackers-are-selling-them-online/
UPDATE 2020-04-09: US Senate tells members to not use Zoom, due to ongoing security issues with the platform.
Here are some noteworthy tidbits:
The US Senate has become the latest organization to tell its members not to use Zoom because of concerns about data security on the video conferencing platform that has boomed in popularity during the coronavirus crisis.
...
Zoom was forced to apologize publicly last week for making misleading statements about the strength of its encryption technology, which is intended to stop outside parties from seeing users’ data.
The company also admitted to “mistakenly” routing user data through China over the past month to cope with a dramatic rise in traffic. Zoom has two servers and a 700-strong research and development arm in China. It had stated that users’ meeting information would stay in the country in which it originated.
https://arstechnica.com/tech-policy/2020/04/us-senate-tells-members-not-to-use-zoom/
Here is another source with similar coverage for those wanting something other than Ars:
https://www.reuters.com/article/us-zoom-video-commn-privacy-senate-idUSKCN21R0VU
and
https://www.cnet.com/news/us-senate-reportedly-tells-members-to-avoid-zoom/
===========
ORIGINAL POST 2020-04-02: Consider this a PSA.
For those of us that are more security conscious, especially during this time where we're all stuck taking online meetings, Zoom is an open sieve of security flaws.
According to Zoom, as of today some of the Windows vulnerabilities have been patched up (first link is updated). But without end to end encryption, any and all of the data that Zoom collects could be given to government agencies or sold to big data.
A report published today by The Intercept finds that the claim might be misleading. Instead of end-to-end encryption for audio and video, Zoom offers something slightly different, called transport encryption.
When The Intercept asked Zoom about its encryption capabilities, a spokesperson straight-up responded that they can't do it. "Currently, it is not possible to enable E2E encryption for Zoom video meetings," the spokesperson said, adding, "Zoom video meetings use a combination of TCP and UDP. TCP connections are made using TLS and UDP connections are encrypted with AES using a key negotiated over a TLS connection."
https://arstechnica.com/tech-policy...e-growing-as-platform-explodes-in-popularity/
Attackers can then use the credentials to access shared network resources, such as Outlook servers and storage devices. Typically, resources on a Windows network will accept the Net-NTLM-v2 hash when authenticating a device. That leaves the networks open to so-called SMBRelay attacks, that can be used to gain unauthorized access to various resources. These attacks don’t require a cracking technique to convert the hash to its corresponding plain-text password. Obtaining the hash and replaying it to a network service is sufficient to be authenticated.
https://arstechnica.com/information...rs-steal-windows-credentials-with-no-warning/
Alternatives? I guess: Facetime, Skype, and Google hangouts.
https://www.thefpsreview.com/2020/0...-exploits-as-hackers-are-selling-them-online/
UPDATE 2020-04-09: US Senate tells members to not use Zoom, due to ongoing security issues with the platform.
Here are some noteworthy tidbits:
The US Senate has become the latest organization to tell its members not to use Zoom because of concerns about data security on the video conferencing platform that has boomed in popularity during the coronavirus crisis.
...
Zoom was forced to apologize publicly last week for making misleading statements about the strength of its encryption technology, which is intended to stop outside parties from seeing users’ data.
The company also admitted to “mistakenly” routing user data through China over the past month to cope with a dramatic rise in traffic. Zoom has two servers and a 700-strong research and development arm in China. It had stated that users’ meeting information would stay in the country in which it originated.
https://arstechnica.com/tech-policy/2020/04/us-senate-tells-members-not-to-use-zoom/
Here is another source with similar coverage for those wanting something other than Ars:
https://www.reuters.com/article/us-zoom-video-commn-privacy-senate-idUSKCN21R0VU
and
https://www.cnet.com/news/us-senate-reportedly-tells-members-to-avoid-zoom/
===========
ORIGINAL POST 2020-04-02: Consider this a PSA.
For those of us that are more security conscious, especially during this time where we're all stuck taking online meetings, Zoom is an open sieve of security flaws.
According to Zoom, as of today some of the Windows vulnerabilities have been patched up (first link is updated). But without end to end encryption, any and all of the data that Zoom collects could be given to government agencies or sold to big data.
A report published today by The Intercept finds that the claim might be misleading. Instead of end-to-end encryption for audio and video, Zoom offers something slightly different, called transport encryption.
When The Intercept asked Zoom about its encryption capabilities, a spokesperson straight-up responded that they can't do it. "Currently, it is not possible to enable E2E encryption for Zoom video meetings," the spokesperson said, adding, "Zoom video meetings use a combination of TCP and UDP. TCP connections are made using TLS and UDP connections are encrypted with AES using a key negotiated over a TLS connection."
https://arstechnica.com/tech-policy...e-growing-as-platform-explodes-in-popularity/
Attackers can then use the credentials to access shared network resources, such as Outlook servers and storage devices. Typically, resources on a Windows network will accept the Net-NTLM-v2 hash when authenticating a device. That leaves the networks open to so-called SMBRelay attacks, that can be used to gain unauthorized access to various resources. These attacks don’t require a cracking technique to convert the hash to its corresponding plain-text password. Obtaining the hash and replaying it to a network service is sufficient to be authenticated.
https://arstechnica.com/information...rs-steal-windows-credentials-with-no-warning/
Alternatives? I guess: Facetime, Skype, and Google hangouts.
Last edited: