{"id":2359,"date":"2020-04-24T15:26:16","date_gmt":"2020-04-24T15:26:16","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=2290"},"modified":"2022-12-02T15:13:46","modified_gmt":"2022-12-02T09:43:46","slug":"zooming-security-vulnerabilities-part-1","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/","title":{"rendered":"Zooming Security Vulnerabilities [Part \u2013 1]"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2020\/04\/header1-Copy-1024x559.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"header1 Copy - Varutra Consulting\"><\/p>\n<p style=\"text-align: center\"><strong>Diving into Zoom Security Vulnerabilities [Part \u2013 1]<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Introduction &#8211;<\/strong><\/h3>\n<p>Zoom is a popular web-based video-conferencing application available to be installed on computer systems and mobile devices that enables users to use online video conferencing services.<\/p>\n<p>Zoom application offers top-quality video, audio, and screen-sharing options with high performance and is available across various platforms.<\/p>\n<p>Recently attackers are attempting to use numerous methodologies through which they are able to exploit the vulnerabilities residing within the application. This blog article talks about a few of the critical vulnerabilities which are making use of the Coronavirus (COVID-19) pandemic as mentioned below:<\/p>\n<p>&nbsp;<\/p>\n<p><strong>1. Zoom Lookalike Domains &#8211;<\/strong><\/p>\n<p>As Zoom is widely used as the video conferencing solution because of the ongoing Corona pandemic and due to the travel restrictions for various business groups and in work from home scenarios, attackers are taking its advantage and have registered numerous Zoom themed domains for malicious purposes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2292\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Zoom-Domains.jpg.png\" alt=\"Zoom Lookalike Domains\" width=\"533\" height=\"287\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source &#8211; Check Point Technologies Blog<\/em><\/p>\n<p>Researchers have discovered malicious files\u00a0using a\u00a0zoom-us-zoom_##########.exe\u00a0an \u201cmicrosoft-teams_V#mu#D_##########.exe\u201d (# representing\u00a0numerous\u00a0digits). Once the file is executed, it will\u00a0try and\u00a0install unwanted third-party applications and malicious payloads.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2293\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Zoom-Cloud.jpg.png\" alt=\"Zoom cloud meeting\" width=\"502\" height=\"409\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source &#8211; Check Point Technologies Blog<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>2. Malicious Zoom Installer &#8211;<\/strong><\/p>\n<p>Malicious Coin digger\u00a0is clubbed with the legitimate installer of Zoom video conferencing application, luring users who want to install the software but end up unwittingly downloading a malicious file, note that these compromised files\u00a0are not\u00a0from Zoom\u2019s official\u00a0website.<\/p>\n<p>Users who try and download the installer (from lookalike domains and malicious domains) download the AutoIt compiled malware which is termed as &#8211; <strong><em>Trojan.Win32.MOOZ.THCCABO<\/em><\/strong><\/p>\n<p>It also checks whether the Microsoft Smart Screen and Windows Defender are enabled and any antivirus solutions running within the system to evade malware detection.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2294 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Zoom-Download.jpg\" alt=\"Vulnerabilities detection\" width=\"506\" height=\"389\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source- Bleeping Computer<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>3. UNC\u00a0Path Injection Vulnerability &#8211;<\/strong><\/p>\n<p>It was discovered that Zoom\u00a0client for Windows is at risk against UNC path injection vulnerability which could allow remote attackers to steal login credentials for victim\u2019s Windows systems. After stealing the information, the victim\u2019s system is exploited to launch any program already present on a victim\u2019s computer or execute arbitrary commands to compromise it remotely.<\/p>\n<p>The attack involves the <strong>SMBRelay<\/strong> technique where Windows automatically exposes a user&#8217;s login username and NTLM password hashes to a remote SMB server when attempting to connect and download a file hosted on the SMB server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2295\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/UNC-Path.jpg.png\" alt=\"UNC\u00a0Path Injection Vulnerability\" width=\"558\" height=\"229\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Medium.com<\/em><\/p>\n<p><strong>Recommendations<\/strong> <strong>for UNC Path <\/strong><strong>Injection Vulnerability<\/strong><strong> &#8211;<br \/>\n<\/strong><\/p>\n<p>Windows users can change the security policy settings to restrict the operating system from automatically passing their\u00a0NTLM\u00a0credentials to a remote server.<\/p>\n<p>This policy is called &#8216;Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers and is found under the following path in the Group Policy Editor.<strong>\u00a0<\/strong><\/p>\n<p><strong>Path &#8211;<\/strong>\u00a0Computer Configuration -&gt; Windows Settings -&gt; Security Settings -&gt; Local Policies -&gt; Security Options -&gt; Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>4. GHOST Vulnerability &#8211;<\/strong><\/p>\n<p>Zoom application is additionally at risk of GHOST vulnerability which is a buffer overflow bug that affects function calls in the Linux Glibc library.<\/p>\n<p>This vulnerability poses a risk of remote code execution attacks. An attacker who exploits this flaw can gain complete control of the compromised system.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>5. Zoom-Bombing &#8211;<\/strong><\/p>\n<p>&#8220;Zoom-Bombing,&#8221; an uninvited intrusion on video calls that affects various virtual classes and business calls.<\/p>\n<p>To Zoom-bomb, attackers find ways to enter Zoom calls they weren&#8217;t invited to, either by receiving the password from others within the call, typing out a random code in the hopes that it is a real meeting ID, or finding a link in a social media post or elsewhere on the internet.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2296\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Zoom-Bomb.jpg.png\" alt=\"Zoom-Bombing\" width=\"542\" height=\"362\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: Shutterstock\/Illustration by Rachel E. Greenspan<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>6. Hackers Exploiting Zoom Vulnerabilities to Record Meetings &#8211;<\/strong><\/p>\n<p>It was discovered that a vulnerability in the Zoom application exists that injects malware into the Zoom process and then records Zoom meeting sessions, also captures the chat text without any user interaction even when the recording option is disabled by the meeting organizer.<\/p>\n<p>At the time of recording, it is believed that none of the participants are aware that the session is being recorded,<\/p>\n<p>Shockingly, the attack is possible with the latest version of Zoom with all the security features turned on and antivirus software installed and running.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2297\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/Meeting-Record.jpg.png\" alt=\"Hackers Exploiting Zoom Vulnerabilities to Record Meetings\" width=\"540\" height=\"282\" \/><\/p>\n<p style=\"text-align: center\"><em>Image Source: <\/em><em>gbhackers.com<\/em><\/p>\n<p><strong>Distribution Methods &#8211;<\/strong><\/p>\n<p style=\"text-align: left\">Phishing Emails, Phishing Domains, Malicious Websites, Unpatched Zoom Application<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Recommendations &#8211;<\/strong><\/p>\n<ol>\n<li>Avoid using Zoom if possible, and check for an alternative video-conferencing application.<\/li>\n<li>Beware of lookalike domains, spelling errors in emails and websites, and unfamiliar email senders.<\/li>\n<li>Be cautious with emails and files received from unknown senders, especially if they are offering special deals or discounts.<\/li>\n<li>Users are advised to download installers from the application\u2019s official websites to avoid any system compromise.<\/li>\n<li>Keep a reliable and tested backup of data that can be restored in case of business emergencies.<\/li>\n<li>Educate users that they should not open attachments from unknown emails.<\/li>\n<li>Block the IoC&#8217;s as listed in the blog article on applicable security solutions.<\/li>\n<li>Do not open attachments in unsolicited emails, even if they come from people in the contact list, and never click on a URL contained in an unsolicited email, even if the link seems benign.<\/li>\n<li>Exercise caution while visiting unknown links or web pages.<\/li>\n<li>Avoid sharing links via social media and try to ensure only trusted colleagues or participants join the meeting.<\/li>\n<li>Avoid using Zoom Personal Meeting ID (PMI) to host events and meetings and use a custom meeting passwords every time.<\/li>\n<li>Keep AV signatures as well as the operating system and 3rd party application patches up-to-date.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><strong>References &#8211;<br \/>\n<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-take-advantage-of-zooms-popularity-to-push-malware\/#sent\/_blank\">https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-take-advantage-of-zooms-popularity-to-push-malware\/<\/a><\/li>\n<li><a href=\"https:\/\/blog.checkpoint.com\/2020\/03\/30\/covid-19-impact-cyber-criminals-target-zoom-domains\/#sent\/_blank\">https:\/\/blog.checkpoint.com\/2020\/03\/30\/covid-19-impact-cyber-criminals-target-zoom-domains\/<\/a><\/li>\n<li><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer\/#sent\/_blank\">https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/zoomed-in-a-look-into-a-coinminer-bundled-with-zoom-installer\/<\/a><\/li>\n<li><a href=\"https:\/\/thehackernews.com\/2020\/04\/zoom-windows-password.html#search\/unc\/_blank\">https:\/\/thehackernews.com\/2020\/04\/zoom-windows-password.html<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Indicators of Compromise (IOCs) &#8211;<br \/>\n<\/strong><\/p>\n<p><strong>URLs:<\/strong><\/p>\n<p>2no[.]co\/1IRnc<\/p>\n<p>hxxps:\/\/2no[.]co\/1O5aW<\/p>\n<p><strong>Hash Values (SHA 256):<\/strong><\/p>\n<p>d65e8a784c2ba0d9f7a029e1817b78b31324fb8c988e0467fd693b0efd890756 (Installer)<\/p>\n<p>04b560d234e8706d5e43532e9e674ee54ed6f63d62795fb0e5776e23da7eb4d8 (64.exe payload)<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Note &#8211;<\/strong> It is highly recommended to read the <a href=\"https:\/\/www.varutra.com\/zooming-security-vulnerabilities-part-2\/\">zooming Security Vulnerabilities Part &#8211; 2<\/a> articles.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Blog Authors &#8211;<\/em><\/p>\n<p><em>Poornima J. \/ Ashish M.<\/em><\/p>\n<p><em>Security Consultants &#8211; Varutra Managed SOC<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Diving into Zoom Security Vulnerabilities [Part \u2013 1] &nbsp; Introduction &#8211; Zoom is a popular web-based video-conferencing application available to be installed on computer systems&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3333,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[277,266,273],"tags":[],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Dive into Zooming Security Vulnerabilities [Part \u2013 1]\" \/>\n\t\t<meta property=\"og:description\" content=\"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t\t<meta property=\"article:section\" content=\"Data Privacy\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-04-24T15:26:16+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T09:43:46+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Dive into Zooming Security Vulnerabilities [Part \u2013 1]\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#article\",\"name\":\"Dive into Zooming Security Vulnerabilities [Part \\u2013 1]\",\"headline\":\"Zooming Security Vulnerabilities [Part \\u2013 1]\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/header1-Copy.jpg\",\"width\":1100,\"height\":600,\"caption\":\"Zooming Security Vulnerabilities\"},\"datePublished\":\"2020-04-24T15:26:16+05:30\",\"dateModified\":\"2022-12-02T15:13:46+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":2,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#webpage\"},\"articleSection\":\"Data Privacy, Security Advisory, Security Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#listItem\",\"position\":2,\"name\":\"Zooming Security Vulnerabilities [Part \\u2013 1]\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/\",\"name\":\"Dive into Zooming Security Vulnerabilities [Part \\u2013 1]\",\"description\":\"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/header1-Copy.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#mainImage\",\"width\":1100,\"height\":600,\"caption\":\"Zooming Security Vulnerabilities\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/zooming-security-vulnerabilities-part-1\\\/#mainImage\"},\"datePublished\":\"2020-04-24T15:26:16+05:30\",\"dateModified\":\"2022-12-02T15:13:46+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Dive into Zooming Security Vulnerabilities [Part \u2013 1]<\/title>\n\n","aioseo_head_json":{"title":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","description":"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","og:description":"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","og:image:width":"1100","og:image:height":"600","article:section":"Data Privacy","article:published_time":"2020-04-24T15:26:16+00:00","article:modified_time":"2022-12-02T09:43:46+00:00","twitter:card":"summary_large_image","twitter:title":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","twitter:description":"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#article","name":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","headline":"Zooming Security Vulnerabilities [Part \u2013 1]","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","width":1100,"height":600,"caption":"Zooming Security Vulnerabilities"},"datePublished":"2020-04-24T15:26:16+05:30","dateModified":"2022-12-02T15:13:46+05:30","inLanguage":"en-US","commentCount":2,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#webpage"},"articleSection":"Data Privacy, Security Advisory, Security Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#listItem","position":2,"name":"Zooming Security Vulnerabilities [Part \u2013 1]","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/","name":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","description":"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#mainImage","width":1100,"height":600,"caption":"Zooming Security Vulnerabilities"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/#mainImage"},"datePublished":"2020-04-24T15:26:16+05:30","dateModified":"2022-12-02T15:13:46+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2359","title":"Dive into Zooming Security Vulnerabilities [Part \u2013 1]","description":"Threat Actors are using this pandemic as an opportunity to exploit zooming security vulnerabilities. Know the recommendation for zoom security vulnerabilities.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Vulnerabilities\",\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use your focus keyphrase more in your H2 and H3 subheadings.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}},\"score\":90},\"additional\":[{\"keyphrase\":\"Zoom Security\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Security Vulnerabilities\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"Zoom Security Vulnerabilities\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2020\/04\/header1-Copy.jpg","og_image_width":"1100","og_image_height":"600","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Data Privacy","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 09:45:09"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/\" title=\"Data Privacy\">Data Privacy<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tZooming Security Vulnerabilities [Part \u2013 1]\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Data Privacy","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/data-privacy\/"},{"label":"Zooming Security Vulnerabilities [Part \u2013 1]","link":"https:\/\/www.varutra.com\/varutravrt3\/zooming-security-vulnerabilities-part-1\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2359"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2359"}],"version-history":[{"count":7,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2359\/revisions"}],"predecessor-version":[{"id":20337,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2359\/revisions\/20337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3333"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}