Technology

Over 500,000 Zoom accounts sold on hacker forums, the dark web

2 Mins read

Over 500,000 Zoom accounts are being sold on the dark web and hacker forums for less than a penny each, and in some cases, given away for free.

These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. The successful logins are then compiled into lists that are sold to other hackers.

Some of these Zoom accounts are offered for free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others are sold for less than a penny each.

Cybersecurity intelligence firm Cyble told BleepingComputer that around April 1st, 2020, they began to see free Zoom accounts being posted on hacker forums to gain an increased reputation in the hacker community.

Zoom accounts offered to gain reputation
Zoom accounts offered to gain reputation

These accounts are shared via text sharing sites where the threat actors are posting lists of email addresses and password combinations.

In the below example, 290 accounts related to colleges such as the University of Vermont, University of Colorado, Dartmouth, Lafayette, University of Florida, and many more were released for free.

Zoom accounts offered for free
Zoom accounts offered for free

BleepingComputer has contacted random email addresses exposed in these lists and has confirmed that some of the credentials were correct.

One exposed user told BleepingComputer that the listed password was an old one, which indicates that some of these credentials are likely from older credential stuffing attacks.

Accounts sold in bulk

After seeing a seller posting accounts on a hacker forum, Cyble reached out to purchase a large number of accounts in bulk so that they could be used to warn their customers of the potential breach.

See also  A Google engineer says survivors of the mass layoffs cried in meetings the day around 12,000 of their colleagues were culled

Cyble was able to purchase approximately 530,000 Zoom credentials for less than a penny each at $0.0020 per account.

The purchased accounts include a victim’s email address, password, personal meeting URL, and their HostKey.

Zoom accounts sold on hacker forums
Zoom accounts sold on hacker forums

Cyble has told BleepingComputer that these accounts include ones for well-known companies such as Chase, Citibank, educational institutions, and more.

For the accounts that belonged to clients of Cyble, the intelligence firm was able to confirm that they were valid account credentials.

In a statement to BleepingComputer, Zoom stated that they have already hired intelligence firms to help find these password dumps so that they can reset affected users’ passwords.

“It is common for web services that serve consumers to be targeted by this type of activity, which typically involves bad actors testing large numbers of already compromised credentials from other platforms to see if users have reused them elsewhere. This kind of attack generally does not affect our large enterprise customers that use their own single sign-on systems. We have already hired multiple intelligence firms to find these password dumps and the tools used to create them, as well as a firm that has shut down thousands of websites attempting to trick users into downloading malware or giving up their credentials. We continue to investigate, are locking accounts we have found to be compromised, asking users to change their passwords to something more secure, and are looking at implementing additional technology solutions to bolster our efforts.”

Change Zoom passwords if used elsewhere

As all companies are affected by credential stuffing attacks, you must use unique passwords for each site that you register an account.

See also  Obour and Ridge Hospital clash over father’s lifeless body

With these attacks utilizing accounts exposed in past data breaches and then being sold online, using a unique password at every site will prevent a data breach from one site affecting you at a another site.

You can also check if your email address has been leaked in data breaches through the Have I Been Pwned and Cyble’s AmIBreached data breach notification services.

Both services will list data breaches containing your email address and further confirm that your credentials have been potentially exposed.

Related posts
Matters ArisingTechnology

Google's AI Chief Foresees Troublesome Times for Start-ups

2 Mins read
Google’s AI Chief Foresees Troublesome Times for Start-ups Many artificial intelligence start-ups are set to fail because they will not be able…
AmericaGlobal 360Matters ArisingTechnology

Bill Gates Takes Action, Dismisses Staff Over Generative AI Copilot

2 Mins read
Bill Gates Takes Action, Dismisses Staff Over Generative AI Copilot Today marks the start of a new era in international development. In…
Matters ArisingTechnology

Huawei's Remarkable Growth Amidst US Sanctions, Achieving Fastest Growth in Four Years

2 Mins read
Huawei’s Remarkable Growth Amidst US Sanctions, Achieving Fastest Growth in Four Years Chinese telecoms firm Huawei grew faster in 2023 than it…

Leave a Reply

Your email address will not be published. Required fields are marked *