Over 530.000 Zoom Account Credentials Are Up For Sale On The Dark Web; Includes Email Addresses, Passwords, Links To Personal Meetings, And Host Keys
Sudais Asif for the cyber security and technology website, HackRead, is reporting (April 14) that over 530,000 Zoom video account credentials are up for sale on the Dark Web. “The sold Zoom video data has been analyzed by cyber security researchers at Cyble who have labled the information authentic,” Mr. Asif writes. Some of the account credentials/info are actually being offered free of charge, and others for fractions on the penny HackRead reports. According to researchers, “these accounts belong to notable institutes and organizations, including the universities of Vermont, Colorado, Dartmouth, Florida, Lafayette, and companies such as Chase and CitiBank, making the threat [much] more serious than Zoom bombing [such as injecting porn into online confereces and staff meetings],” Mr. Asif notes.
Cyble actually purchased accounts, in order to verify the authenticity — which included email addresses, passwords, links of personal meetings, and host keys, which are used to claim [verify] one’s position [reason for being at the meeting] HackRead reported. “Furthermore, some of the credentials obtained were also tested; and appeared to work,” further underscoring their authenticity.
Mr. Asif writes that “Zoom users change their passwords,” and ensure they are complicated enough so that they cannot be easily guessed.
I have been writing on this for several days. My guess is that Zoom is furiously working on implementing much stronger network security and protocols. But, they must address weak encryption and their digital connections with China ASAP. Healthcare providers have joined the Zoom crowd. When you combine the OPM breach personal data of millions of federal employee’s who have Secret and Top Secret clearances, and now potentially expose their personal medical information — it makes for a potent cocktail for potential espionage by Beijing. RCP, fortunascorner.com