Zoom video conferencing application has raised to prominence amid lockdowns across the globe. The downloads spiked to accommodate the sudden surge in demand for work from home. However, the app also witnessed a lot of breaches in security.
The App(Zoom) has been in the middle of a privacy storm for quite some time. Now, the app has another thing to worry about. Details of over five lakh account holders have been listed on the dark web.
A new report from the Bleeping Computer has claimed that data of around 5,00,000 Zoom users in on sale on the dark web.
The accounts that are on sale are being sold at prices even lower than Re 1. The report claims that the listing was spotted by a cybersecurity intelligence firm Cyble around April 1. The intelligence firm went ahead with the purchase of around 5,30,000 accounts at a price of just $0.0020 per account which roughly translates to 15 paise for each account.
These account credentials have been gathered via stuffing attacks wherein hackers attempt to login to users’ Zoom accounts using accounts leaked in older data breaches. The successful logins are then compiled into a list and then sold to other hackers via the dark web or via hacker forums.
According to the report, the accounts that were found vulnerable included some prominent names including that of banks and educational organizations. 290 accounts were linked to popular institutes like the University of Vermont, Dartmouth, Lafayette, University of Florida, University of Colorado. Few of these leaked accounts also belonged to big companies like Citibank and Chase.
The Company in-response said that- “It is common for web services that serve consumers to be targeted by this type of activity, which typically involves bad actors testing large numbers of already compromised credentials from other platforms to see if users have reused them elsewhere. We have already hired multiple intelligence firms to find these password dumps and the tools used to create them, as well as a firm that has shut down thousands of websites attempting to trick users into downloading malware or giving up their credentials.
This kind of attack generally does not affect our large enterprise customers that use their own single sign-on systems.
We continue to investigate, are locking accounts we have found to be compromised, asking users to change their passwords to something more secure, and are looking at implementing additional technology solutions to bolster our efforts- ”Zoom added.