Zoom Security Vulnerability Leaks Windows Login Credentials To Hackers – SLCERT issues a “High” Threat level warning

Zoom-Security

Popular video conferencing app, Zoom has a security flaw that allows hackers to steal users’ Windows 10 network login credentials if they click on a malicious link in the chat window, reports BleepingComputer and HackerNews.com as well. 

For those unaware, Zoom recently has seen a sudden surge in popularity and usage, as people are forced to work and study from home amidst the coronavirus (COVID-19) pandemic. 

Spotted by cybersecurity researchers, Mitch (@_g0dmode) and Matthew Hickey (@HackerFantastic), the Zoom client for Windows is vulnerable to a high-risk Universal Naming Convention (UNC) injection vulnerability that enables hackers to steal a user’s login name and their NTLM password hash every time someone clicks on a link within messages.

Meantime today, Sri Lanka Computer Emergency Readiness Team (SLCERT) has issued a “High” Threat level warning on Zoom Video Conference App & it’s unpatched vulnerability which let’s remote attackers steal login credentials form Windows PCs. Following is the official release by SLCERT.

Web Design Sri Lanka

 

Zoom has been there for nine years, but the immediate requirement of an easy-to-use video conferencing app during the coronavirus pandemic overnight made it one of the most favorite communication tool for millions of people around the globe.

No doubt, Zoom is an efficient online video meeting solution that’s helping people stay socially connected during these unprecedented times, but it’s still not the best choice for everyone—especially those who really care about their privacy and security.

According to cybersecurity expert @_g0dmode, the Zoom video conferencing software for Windows is vulnerable to a classic ‘UNC path injection‘ vulnerability that could allow remote attackers to steal victims’ Windows login credentials and even execute arbitrary commands on their systems.

Such attacks are possible because Zoom for Windows supports remote UNC paths that convert potentially insecure URIs into hyperlinks when received via chat messages to a recipient in a personal or group chat.

 

Hacking Zoom to Steal Windows Passwords Remotely

Confirmed by researcher Matthew Hickey and demonstrated by Mohamed Baset, the first attack scenario involves the SMBRelay technique that exploits the fact that Windows automatically exposes a user’s login username and NTLM password hashes to a remote SMB server when attempting to connect and download a file hosted on it.

To steal Windows login credentials of a targeted user, all an attacker needs to do is sent a crafted URL (i.e., \\x.x.x.x\abc_file) to a victim via a chat interface.

Once clicked, the attack would eventually allow the attacker-controlled SMB share to automatically capture authentication data from Windows, without the knowledge of the targeted user.

To be noted, the captured passwords are not plaintext; instead, NTLM hashes of them, but a weak one can easily be cracked in seconds using password cracking tools like HashCat or John the Ripper.

In a shared environment, like office space, stolen Windows login credentials can be reused immediately to compromise other users or IT resources, and launch further attacks.

Exploiting Zoom to Compromise Windows Systems Remotely

Besides stealing Windows credentials, the flaw can also be exploited to launch any program already present on a targeted computer or execute arbitrary commands to compromise it remotely, confirmed by Google security researcher Tavis Ormandy.

As shown, Ormandy demonstrated how the UNC path injection flaw in Zoom can also be exploited to run a batch script—without a prompt—containing malicious commands when called from the Windows default download directory.

The second attack scenario relies on the fact that browsers running on Windows operating system automatically save downloaded in a default folder, which can be abused to first trick a user into downloading the batch script and then triggering it using the zoom bug.

To be noted, to exploit this issue, an attacker must be aware of the Windows username for the targeted user, which, however, can easily be obtained using the first SMBRelay attack.

In addition, another security researcher going by the name ‘pwnsdx’ on Twitter shared another trick with The Hacker News that could let attackers hide malicious links when displayed at the recipients’ end, potentially making it look more convincing and practical.

What Should Zoom Users Do?

Zoom has already been notified of this bug, but since the flaw has not yet been patched, users are advised to either use an alternative video conferencing software or Zoom in their web browsers instead of installing a dedicated client app on their systems.

(Update: A day after we published this report, Zoom apologies for falling short of privacy and security expectations and released an updated version if it software to patch recently reported multiple security issues, including UNC path injection.)

Some of the best alternative video conferencing and chat software are:

  • Skype & Microsoft Teams (up to 50 participants)
  • Google Hangouts Meet (up to 250 participants)
  • Google Duo
  • Jitsi (free, encrypted, open source, up to 75 participants)
  • FaceTime and Signal for privacy

Besides using a strong password, Windows users can also change the security policy settings to restrict the operating system from automatically passing their NTML credentials to a remote SMB server.

More Zoom-related Security and Privacy Incidents

This is not the only issue to have been uncovered in Zoom video conferencing software over the past couple of days, raising privacy and security concerns among millions of users.

The FBI is warning zoom users of the “Zoom-Bombing” attack after some people find a way to sneak their way into unsuspecting meetings and online gatherings and bombarded them with pornographic images or racist comments.

Just yesterday, another report confirmed that Zoom doesn’t use end-to-end encryption to protect calling data of its users from prying eyes despite telling users that “Zoom is using an end to end encrypted connection.”

Last week, Zoom updated its iOS app after it was caught sharing users’ device information with Facebook, raising legitimate concerns over users’ privacy.

Earlier this year, Zoom also patched another privacy bug in its software that could have let uninvited people join private meetings and remotely eavesdrop on private audio, video, and documents shared throughout the session.

Reference: thehackernews.com  & techworm.net




About us

Lanka Business News is amongst the leading online Business News portals in Sri Lanka, unique for its focus on contemporary business news relevant across multiple industries operating in the country. We present not only the news, but a perspective based on observations and possible implications of a prevailing news item. LBN also provides an insight to the impact of a global economic or industrial development, thus helping stakeholders make informed and calculated decisions.




Follow Us


Newsletter