Head Lines
    Headlines
  • Telangana Assembly passes TSRTC merger Bill
  • 'Money Heist'-Inspired Cyber Criminals Arrested For Conning Noida Businessman
  • SC to monitor cases of crime against women in Manipur
  • Veg thali cost surges 28% in July amid soaring food prices
  • IIM Lucknow launches executive programme in AI for Business
  • Govt to open research park at top educational institutions to promote science & tech
  • US to send Ukraine first $200 million of arms freed by $6.2 billion 'error'
  • Reliance Retail says it is set to lead the retail industry in the coming decade
  • Karnataka High Court accepts petition challenging provisions of Real Estate Regulatory Act
  • ‘I’m doing this for Pewdiepie’: MrBeast challenges T-Series, will fight to become YouTuber with maximum subscribers

Zoom has already had its fair share of cyber security issues for a lifetime, and the video conferencing app took a while (and Alex Stamos) to steady its ship on the security front after finding unexpected popularity due to the Covid-19-necessitated work from home mandates. Now, it appears to still have retained a critical security flaw that could allow threat actors with intent to exploit the vulnerability and undertake a remote code execution (RCE) attack to take control of host PCs. The vulnerability was discovered by two Computest cyber security researchers at the recent Pwn2Own competition, organised by the Zero Day Initiative.

 

For the hack to work, the attacker first needs to be a part of the same organisational domain as the host PC’s user, or needs to be permitted to join the meeting by the host – hence adding one layer of security, if not anything else. However, security and privacy advocates clearly know that social engineering attacks can quite clearly breach barriers such as feigning stolen identities to gain access to private conferences and meetings – although this represents a different cyber security debate altogether.

Nevertheless, with the Zoom vulnerability, once attackers were part of a meeting, they could execute a chain of three malware relays to install an RCE backdoor on the targeted PC. In simpler terms, the attackers can gain access to your PC, and subsequently be able to execute remote commands that would then give them access to your sensitive files. What’s even more alarming here is that the attackers can carry out all of these actions without any user being required to do anything, therefore doing away with an added interaction layer that could have slowed down the potential of such attacks.

 

Computest researchers Daan Keuter and Thijs Alkemade were awarded a $200,000 (~Rs 1.5 crore) bounty for making the critical discovery, which was also one of the headlining finds of this year’s Pwn2Own. The attack works on both Windows and Mac, and Zoom’s iOS and Android apps haven’t been tested for it, yet. The browser version remains unaffected with it. Since Zoom is yet to patch the flaw, the exact technical details of the vulnerability have not been disclosed to the public, yet. The said patch should arrive on Zoom for Windows and Mac within the next 90 days.

 

comments

No Comments Till Now.

Write Your Story