Categories: Technology

Zoom, still problems: hundreds of thousands of accounts for sale on the dark web

Zoom been the subject (or perhaps victim?) of a surge in popularity in recent weeks with the triggering of the social distancing measures imposed by the pandemic COVID-19: the huge number of people who found themselves working from home overnight had to find ways to keep in touch, even visually, with colleagues, customers and partners. Zoom proved to be the most immediate choice for those who did not already use another type of solution.

However, in recent weeks the surge in popularity has also highlighted Zoom's many weaknesses, mainly on the privacy and security front. Such a serious situation has led the CEO of the company to make public amends and to resolve problems as soon as possible.

Now a new tile: hundreds of thousands of Zoom accounts are sold – and in some cases given away – on the dark web and on hacking forums.

The spread of accounts in the maze of the dark web for does not seem to be a direct consequence of the flaws in the app but instead the result, apparently, a "credential stuffing" attack, where the hacker (s) on duty try to penetrate into the accounts using credentials recovered with previous "data leaks" also from other realities. Successful authentication attempts are cataloged in a list, and sold or given away to other hackers for the purpose of using them either for tacky jokes, so-called Zoom-bombing, or for more dangerous activities. Accounts are shared via text sharing sites as a list of email / password pairs. Accounts can include personal meeting addresses and HostKey as well as authentication credentials.


Source: Bleeping Computer

Cyble security company managed to purchase one list of over 530 thousand Zoom credentials, paying them $ 0.002 each. Zoom accounts began circulating in hacking communities in early April and mainly as a sort of "initiation rite" for some hackers who offer these lists as ways to build a reputation in the environment.

News like this is no longer surprising, but it is still important to understand how fundamental it is in the context of an adequate personal digital security strategy the choice of unique passwords for each service to which we register, so as to make credential attempts ineffective stuffing.

Miners Hashrate

Recent Posts

Mining RTX 3070 at NiceHash: Overclocking, tuning, profitability, consumption

Mining on RTX 3070. Overclocking, tuning, profitability, consumption: If you are interested in finding more…

6 months ago

Mining GTX 1660, 1660 Ti, 1660 Super: Overclocking, settings, consumption

Mining with GTX 1660, 1660 Ti, 1660 Super. Overclocking, settings, consumption, profitability, comparisons - If…

6 months ago

Mining RTX 2070 and 2070 Super: Overclocking, profitability, consumption

Mining with RTX 2070 and 2070 Super. Overclocking, profitability, consumption, comparison What the RTX 2070…

6 months ago

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption

Mining with RTX 3060, 3060 Ti. Limitations, overclocking, settings, consumption, profitability, comparison Let's look at…

6 months ago

Alphacool Eisblock Aurora Acryl GPX-A Sapphire – test: 2.8 GHz++ are not an issue

Alphacool Eisblock Aurora Acryl GPX-A (2022) with Sapphire Radeon RX 6950 XT Nitro+ Pure in…

6 months ago

Corporate Crypto Strategies 4.0: Leading with Bitcoin Expertise

In the ever-evolving landscape of business strategy, Bitcoin has emerged as a pivotal asset. With…

6 months ago

This website uses cookies.


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5420