Security News > 2020 > April > New Zoom Hack Lets Hackers Compromise Windows and Its Login Password
Such attacks are possible because Zoom for Windows supports remote UNC paths that convert potentially insecure URIs into hyperlinks when received via chat messages to a recipient in a personal or group chat.
Hacking Zoom to Steal Windows Passwords Remotely Confirmed by researcher Matthew Hickey and demonstrated by Mohamed Baset, the first attack scenario involves the SMBRelay technique that exploits the fact that Windows automatically exposes a user's login username and NTLM password hashes to a remote SMB server when attempting to connect and download a file hosted on it.
Exploiting Zoom to Compromise Windows Systems Remotely Besides stealing Windows credentials, the flaw can also be exploited to launch any program already present on a targeted computer or execute arbitrary commands to compromise it remotely, confirmed by Google security researcher Tavis Ormandy.
The second attack scenario relies on the fact that browsers running on Windows operating system automatically save downloaded in a default folder, which can be abused to first trick a user into downloading the batch script and then triggering it using the zoom bug.
What Should Zoom Users Do? Zoom has already been notified of this bug, but since the flaw has not yet been patched, users are advised to either use an alternative video conferencing software or Zoom in their web browsers instead of installing a dedicated client app on their systems.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/tGezqi3DLXY/zoom-windows-password.html
Related news
- Windows driver zero-day exploited by Lazarus hackers to install rootkit (source)
- 0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193) (source)
- Hackers use PHP exploit to backdoor Windows systems with new malware (source)
- Iranian hackers charged for ‘hack-and-leak’ plot to influence election (source)
- Iranian hackers now exploit Windows flaw to elevate privileges (source)