Archive for Zoom

A Highly Dangerous Zoom #Phishing Email Is Making The Rounds

Posted in Commentary with tags on February 28, 2023 by itnerd

Since the start of the pandemic, Zoom has exploded in popularity as a means to communicate. But threat actors are latching onto that to advance their goals. Take this email for example:

It looks well crafted and seems like something that could come from Zoom. But look closer and you’ll see that it isn’t from Zoom. Starting with this:

This isn’t a Zoom email address as Zoom uses as their domain. So right out of the gate, this is a red flag. Now I will say that unlike most phishing scams that I come across, the English in this email is decent. I guess threat actors are finally learning that their English needs to be on point if they have any hope of scamming someone. But what hasn’t changed is a call to action to get you to do what they want. Specifically this:

Please take note that your account will continue to be inactive until you install the security app. We’re sorry for any inconvenience this may cause.

If you think that you can’t use Zoom until you install this “Security App”, then you’re more likely to click on “Install Security App”. Which by the way you should not click on that. But because I am a trained professional, I did. And here’s what I got:

Now I have to admit that the threat actors spent a lot of time and effort making this look just like something that Zoom would do. But a closer look shows that this isn’t a Zoom web page:

Again, Zoom’s domain for web and email is Thus this is another red flag. And to reinforce the fact that they want you to do what the threat actors want, there’s this:

This makes me think that this scam is aimed at companies who use Zoom rather than individuals as those are all features that companies use. Also, you’ll notice that the quality of the English falls apart here.

I’m pretty sure that if you click download, you’ll get some malware. Let’s find out by taking a Windows 11 virtual machine and trying to install it just for giggles. I recorded the install process for you to view.

Now I did compare this to the real Zoom installer and the install process is identical. The only thing that jumps out at me is the version number, which is version 5.13.5 (12053). The latest version that I am aware of for Windows is 5.13.10 (13305) which makes this slightly older. I also noted that Microsoft Defender didn’t stop this. I also ran this by VirusTotal and it didn’t flag this as suspicious either. That implies that this is a novel attack of some sort which makes this extremely dangerous. I am going to investigate this further and I will update you with my findings. But in the meantime, I have reached out to Zoom and submitted all of this information so that they can put an end to this. But until they do, I would not only watch out for this threat if it hits your inbox, I would send this out far and wide to make sure nobody gets hit with this as clearly this threat is dangerous.

UPDATE: You can read my analysis of this threat here.

Zoom Fixes Mac Security Bug… Until Someone Discovers The Next Security Bug

Posted in Commentary with tags on August 15, 2022 by itnerd

Yesterday I spoke of a flaw in Zoom’s update process on the Mac:

During his talk at DefCon, though, [Patrick] Wardle announced another Mac vulnerability he discovered in the installer itself. Zoom now conducts its signature check securely, and the company plugged the downgrade attack opportunity. But Wardle noticed that there is a moment after the installer verifies the software package—but before the package installs it—when an attacker could inject their own malicious software into the Zoom update, retaining all the privileges and checks that the update already has. Under normal circumstances, an attacker would be able to grab this opportunity only when a user is installing a Zoom update anyway, but Wardle found a way to trick Zoom into reinstalling its own current version. The attacker can then have as many opportunities as they want to attempt to insert their malicious code and gain the Zoom automatic update installer’s root access to the victim device.

Over the last 24 hours, Zoom has rolled out a fix for this. Version 5.11.5 of its Mac app is now available and you should go download this now to fix this issue. And the guy who found this issue, Patrick Wardle has effectively given this fix his stamp of approval:

So while Zoom was able to fix this quickly, I have to say that this is simply the latest security flaw that has been found in their app. Over the years I have covered flaw after flaw with Zoom. And then there’s the part about them lying about end to end encryption and getting caught doing so. What that says to me that their security processes are at best sketchy. If Zoom really want to shake their past daemons of playing fast and loose with security, then they need to make sure that stuff like this are edge cases and not common occurrences. But for now, this issue is closed. But rest assured they’ll be another one as I guarantee you that a lot of people are looking at their code looking for exploits. And not all of them will be like Patrick Wardle and tell them about what they find.

Zoom Is In Trouble Again…. This Time They Have Security Issues With Their Update Process For Mac

Posted in Commentary with tags on August 14, 2022 by itnerd

Zoom seems to be a company that can’t stay out of trouble. This time well known security researcher Patrick Wardle has disclosed a trio of vulnerabilities in Zoom’s update process. Two have been patched, but one is unpatched and Wired has the details:

During his talk at DefCon, though, Wardle announced another Mac vulnerability he discovered in the installer itself. Zoom now conducts its signature check securely, and the company plugged the downgrade attack opportunity. But Wardle noticed that there is a moment after the installer verifies the software package—but before the package installs it—when an attacker could inject their own malicious software into the Zoom update, retaining all the privileges and checks that the update already has. Under normal circumstances, an attacker would be able to grab this opportunity only when a user is installing a Zoom update anyway, but Wardle found a way to trick Zoom into reinstalling its own current version. The attacker can then have as many opportunities as they want to attempt to insert their malicious code and gain the Zoom automatic update installer’s root access to the victim device.

“The main reason I looked at this is that Zoom is running on my own computer,” Wardle says. “There’s always a potential tradeoff between usability and security, and it’s important for users to install updates for sure. But if it’s opening this broad attack surface that could be exploited, that’s less than ideal.”

To exploit any of these flaws, an attacker would need to already have an initial foothold in a target’s device, so you’re not in imminent danger of having your Zoom remotely attacked. But Wardle’s findings are an important reminder to keep updating—automatically or not.

The bigger problem with this is that yet again, Zoom has been caught with its pants down so to speak. They keep having security issue after security issue to the point where I wonder if they are playing “whack a mole” when it comes to fixing issues with their applications. At this point one has to wonder if the company takes security seriously or not. Having said that, be sure to update when a fix for this latest security issue appears.

Zoom To Pay Up Big Time In “Zoom-Bombing” Class Action Lawsuits

Posted in Commentary with tags , on April 24, 2022 by itnerd

For those of you who aren’t aware of this. “Zoom-Bombing” is when uninvited guests crash your Zoom meeting and do anything from just listen in to playing porn, or anything in between. It was a big deal a couple of years ago. This led to a string of class action lawsuits against Zoom claiming:

  • Zoom failed to prevent “Zoombombings”
  • Zoom unlawfully shared data with authorized third parties such as Facebook, Google and LinkedIn
  • Zoom lied about the strength of its end-to-end encryption protocols

I guess Zoom decided that it was cheaper to settle than to fight. Which has led to them settling 14 different class action lawsuits:

As part of the settlement agreement, Zoom Video Communications, the company behind the teleconference application that grew popular during the pandemic, will pay the $85m to users in cash compensation and also implement reforms to its business practices.

And here are the changes that Zoom must make:

As part of the settlement, Zoom has agreed to over a dozen changes to its business practices that are designed to “improve meeting security, bolster privacy disclosures and safeguard consumer data”, according to court documents.

As part of those changes, the company is required to develop and maintain a user-support ticket system to track reports of meeting disruptions, a documented process for communicating with law enforcement regarding disruptions that include illegal content, a suspend-meeting button and the ability to block users from certain countries.

A lawyer representing Zoom put out a comment putting some spin on this:

Mark Molumphy, a partner at Cotchett, Pitre & McCarthy, LLP said:

“Millions of Americans continue to use Zoom’s platform with the expectation that their conversations will be kept private and secure. This groundbreaking settlement will provide a substantial cash recovery to Zoom users and implement privacy practices that, going forward, will help ensure that users are safe and protected.”

But at the same time a lawyer representing the plaintiffs had this to say:

Tina Wolfson, a partner at Ahdoot Wolfson said:

“In the age of corporate surveillance, this historic settlement recognizes that data is the new oil and compensates consumers for unwittingly providing data in exchange for a free service. It also compensates those who paid for a product they did not receive and commits Zoom to changing its corporate behavior to better inform consumers about their privacy choices and provide stronger cybersecurity.”

Now, you don’t have to wait for Zoom to make changes to protect yourself from being “Zoom-Bombed”. Here’s my tips for using Zoom safely:

  • When you send out a meeting invite, ensure that the meeting has a password associated with it. This support document can help you with that.
  • Don’t share the meeting invite on social media. Send it directly to the invitees.
  • Use the waiting room function which puts users who join your meeting into a virtual waiting room that allows you to identify them and admit them to the meeting if they are supposed to be there. This support document will explain how to use that feature.
  • Don’t use your personal meeting ID for meetings if you can avoid it.
  • Keep your audio and video off by default when joining a meeting. That way when you join, you can enable what you need to or feel comfortable enabling. This support document will tell you how to do that.
  • Don’t keep Zoom running on your computer if you don’t need it.
  • Make sure you have a strong password for your Zoom account. This support document can help you with that.

The first four items will help you to mitigate “Zoom-Bombings”. The last three are more of a suggestion to protect your privacy.

Hopefully Zoom learns from this as this is not the first time that Zoom has paid up to make a lawsuit go away. And I have to imagine that cutting these cheques is starting to get expensive.

A Bug In The Zoom Mac Client Makes It Appear That Zoom Is Spying On Mac Users

Posted in Commentary with tags on January 14, 2022 by itnerd

A question a couple of my clients have called me to troubleshoot an issue that I want to bring to light. And it’s one that I have been able to reproduce rather easily.

Here’s the rundown.

If you have Zoom 5.91 or earlier installed on your Mac, and you’re running macOS Monterey 12.1 or earlier, and the Zoom app is running but not in a meeting of any sort, you’ll eventually notice that the orange dot that denotes when your microphone is in use appears in the top right corner on the menu bar. It will look like this:

One of the things that was added to macOS Monterey was a notification that lets you know when the microphone is in use. And that notification is the orange dot that you see above. And it appears that the Zoom app is apparently using the microphone. Which I confirmed by checking control center.

I tested this after reboots and in one case a reinstall of macOS and always got this result. Now to be clear, my guess is that Zoom are not spying on their users. But this isn’t a good look for Zoom regardless as many people are going to assume that they are. And in the process of researching this, I found out two things:

  • First, this was supposedly fixed in version 5.91 of Zoom as per these release notes. But that apparently does not seem to be true as I was able to reproduce this numerous times on numerous macOS computers with version 5.91. This takes away Zoom’s ability to say that users should simply update to the latest version.
  • Second, I am not alone in seeing this. This thread in the Zoom community along with this thread on Stackexchange details people seeing this as well. So clearly this is a pervasive problem that hasn’t been addressed by Zoom.

My advice is that you should only run the Zoom client when you actually need it until this gets addressed. Or if you’re really paranoid, use another conferencing product. As for Zoom, they’ve had their issues with security over the years. If you search my blog you will find those stories with ease. They need to step up and put this to bed quickly if they want to avoid going back to the days where trust in their product was questionable at best.

UPDATE 2/11/22: Zoom said that it has fixed the issue in version 5.9.3. But they said that in version 5.9.1 so I would only run Zoom when you need to run it to mitigate this issue should it still be present.

Zoom To Pay Up To Make A Lawsuit Go Away

Posted in Commentary with tags on August 4, 2021 by itnerd

Zoom will have to cut a rather big cheque to the tune of $85 million to make a lawsuit related to lying about offering end-to-end encryption on its services, as well as providing user data to Facebook and Google without permission. Here’s the details:

Zoom has agreed to pay $85 million to settle claims that it lied about offering end-to-end encryption and gave user data to Facebook and Google without the consent of users. The settlement between Zoom and the filers of a class-action lawsuit also covers security problems that led to rampant “Zoombombings.”

The proposed settlement would generally give Zoom users $15 or $25 each and was filed Saturday at US District Court for the Northern District of California. It came nine months after Zoom agreed to security improvements and a “prohibition on privacy and security misrepresentations” in a settlement with the Federal Trade Commission, but the FTC settlement didn’t include compensation for users.

I should note that Zoom has addressed a lot of these issues. And Zoom is making craploads of money. So does this really punish Zoom for their behavior? I don’t think so.

Zoom Suspended The Accounts Of Hong Kong Activists At The Request Of China… Now Congress Wants To Know More

Posted in Commentary with tags on June 12, 2020 by itnerd

It seems that Zoom cannot stay out of the news for all the wrong reasons. This time Zoom is in hot water because Zoom issued a statement on Thursday acknowledging that the Chinese government requested that it suspend the accounts of several U.S.- and Hong Kong-based Chinese activists for holding events commemorating the anniversary of the 1989 Tiananmen Square massacre:

Recent articles in the media about adverse actions we took toward Lee Cheuk-yan, Wang Dan, and Zhou Fengsuo have some calling into question our commitment to being a platform for an open exchange of ideas and conversations. To be clear, their accounts have been reinstated, and going forward, we will have a new process for handling similar situations. 

We will do better as we strive to make Zoom the most secure and trusted way to bring people together. 

Now if you read the rest of the blog post, Zoom acknowledges that they screwed up here. And that they are going to take corrective actions:

  • Going forward Zoom will not allow requests from the Chinese government to impact anyone outside of mainland China.
  • Zoom is developing technology over the next several days that will enable us to remove or block at the participant level based on geography. This will enable us to comply with requests from local authorities when they determine activity on our platform is illegal within their borders; however, we will also be able to protect these conversations for participants outside of those borders where the activity is allowed.
  • We are improving our global policy to respond to these types of requests. We will outline this policy as part of our transparency report, to be published by June 30, 2020.

Now that isn’t good enough for some. Three U.S. lawmakers asked Zoom to clarify its data-collection practices and relationship with the Chinese government:

Representatives Greg Walden, the top Republican on the House Energy and Commerce Committee, and Cathy McMorris Rodgers, the ranking member of a consumer subcommittee, sent a letter to Zoom CEO Eric Yuan on Thursday asking him to clarify the company’s data practices, whether any was shared with Beijing and whether it encrypted users’ communications. 

Republican Senator Josh Hawley also wrote to Yuan asking him to “pick a side” between the United States and China. 

The three politicians have previously expressed concerns about TikTok’s owner, Chinese firm ByteDance, which is being scrutinized by U.S. regulators over the personal data the short video app handles.

Seeing as this is an election year, I would not be at all surprised if Congressional Hearings were called and Zoom CEO Eric Yuan was called onto the carpet. Because if Yuan thought his blog post would put out the fire related to this latest scandal, he’d be wrong.

Zoom May Only Enable End To End Encryption For Paying Customers…. My Take

Posted in Commentary with tags on June 1, 2020 by itnerd

Zoom has been working hard to overcome their security issues over the last few months. One of the things that they needed to address is the fact that communications were not end to end encrypted, even though the company claimed that they were. The company finally admitted that this was something that needed to be addressed. And it looks like that end to end encryption is about to be lit up, assuming that you have the latest version of the Zoom app, and you happen to be a paying customer:

The company, whose business has boomed with the coronavirus pandemic, discussed the move on a call with civil liberties groups and child-sex abuse fighters on Thursday, and Zoom security consultant Alex Stamos confirmed it on Friday. 

In an interview, Stamos said the plan was subject to change and it was not yet clear which, if any, nonprofits or other users, such as political dissidents, might qualify for accounts allowing more secure video meetings. 

He added that a combination of technological, safety and business factors went into the plan, which drew mixed reactions from privacy advocates.

Now I can look at this two ways:

  • It makes sense that Zoom would focus this on paying customers. After all, that is what keeps the lights on. It also gets rid of the people who are hogging resources related to the free tier of the app which likely costs Zoom money.
  • Other apps like iMessage, WhatsApp, and Signal offer end to end encryption for free.

You’ll note that the plan is subject to change. I suspect that it may change based on either the blowback that they get, or if people on the free tier abandon the platform for another video chat solution en masse.

My take is that I think that Zoom is doing the right thing. Yes there’s going to be blowback from some who think Zoom should enable end to end encryption for all. But that’s really not viable in my opinion. Zoom is a business and not a charity. At some point they have to pay for all the security improvements that are going into the app. And if you want want those security improvements, you need to pay up. So I would suggest that users who are on the free tier of Zoom who want these improvements should put their money where their mouths are.

Zoom Provides A List Of Best Practices For Teachers Using Online Classrooms

Posted in Commentary with tags on May 27, 2020 by itnerd

With the closure of Canadian schools over the last 10 weeks and with many not scheduled to reopen this school year, video communication technology has become an essential tool for many educators as they look to maintain the feeling of in-person classes and lessons. To help teachers, students and parents get the most out of their virtual classrooms, Zoomhas put together a number of resources and best practices designed to facilitate a smooth and secure transition to online learning.

Best practices for securing online classrooms

With security as a paramount concern for educators, parents and students alike, it’s important that teachers know exactly how to control the virtual meeting environment. Zoom has developed an online resource guide to help facilitate secure online learning sessions. Some of the top tips include:

  • Lock your virtual classroom: Teachers can lock a Zoom session that’s already started so no one else can join. Give students time to join and then lock the meeting (kind of like closing the classroom after the bell!).
  • Use the Waiting Room: The Waiting Room feature is one of the best ways to protect your Zoom virtual classroom and keep out those who aren’t supposed to be there. There are two options to choose from when this is in use: either all participants will be sent to the virtual waiting area, where the teacher can admit them individually or all at once; or the host can opt to have known students skip the Waiting Room and join, but have anyone not signed in/part of your school sent to the virtual waiting area. (As of March 31, the Waiting Room feature is automatically turned on by default.)
  • Control screen sharing: Zoom has recently updated its settings for educational users to allow only the host (typically the teacher) to share his or her screen by default. If students need to share their screens, teachers can still give that privilege to students on a case-by-case basis.
  • Lock down the chat: Much like a hawk-eyed teacher might stop a note being passed in class, teachers can restrict the chat function of Zoom so students cannot privately message others during class time.
  • Other important security functions such as removing participants and securely scheduling a class are also available to teachers using Zoom to facilitate online learning. Please see all the tips on Zoom’s official blog.

Frequently asked questions – answered!
From hosting a webinar or a meeting, to properly setting up a virtual classroom for students, there are many questions teachers are looking to have answered — even if they have already started using Zoom for online teaching. Zoom has compiled a list of its top 10 virtual classroom most frequently asked questions for educational users to help teachers make the best of their online classrooms. Some of the top tips include:

  • How do I share my screen? Screen sharing lets teachers present slides, videos and other content to students.
  • Should I use a Zoom meeting or Zoom webinar? Webinars allow teachers to better present information in a one-to-many setting, similar to a lecture style, whereas meetings allow for more two-way flow of conversation. Which ever type of Zoom session teachers choose, they should consult the best practices for securing their online classroom.
  • How do I take classroom attendance? Zoom can mimic a classroom attendance sheet by allowing teachers to review the registration report to see which students registered and attended a given class.

Be sure to review all the questions including how to see all your students on video, and how to host a meeting using a mobile device on the official Zoom blog and on this resource page for educators. Zoom regularly posts updates about product features and resources for users to its official blog.

Zoom Acquires Keybase

Posted in Commentary with tags on May 7, 2020 by itnerd

Zoom and Keybase today announced that Zoom has acquired Keybase, a secure messaging and file-sharing service. The acquisition of this exceptional team of security and encryption engineers will accelerate Zoom’s plan to build end-to-end encryption that can reach current Zoom scalability. 

As members of Zoom’s security engineering function, the Keybase team will provide important contributions to Zoom’s 90-day plan to proactively identify, address, and enhance the security and privacy capabilities of its platform. Max Krohn, co-founder and developer will lead the Zoom security engineering team, reporting directly to Eric S. Yuan, CEO of Zoom. Leaders from Zoom and Keybase will work together to determine the future of the Keybase product. The terms of the transaction were not disclosed. 

Visit the Zoom blog for more details on the plans for building the end-to-end encryption offering.