Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.
The upside of a pandemic that forces millions of new users to introduce themselves to video conferencing tools like Zoom is pretty apparent—a massive surge in new users, in revenues, in brand recognition, and shareholder value.
The downside in millions of new users poking around a critically important tool they've probably never paid any attention to before is that many of those users are security nerds and bounty hunters. And in just a matter of weeks, the pandemic high that Zoom was basking in quickly turned into a nasty hangover stoked by allegations of multiple security vulnerabilities and questionable privacy decisions.
New vocabulary like Zoombombing soon sucked the wind out of Zoom's sails. Businesses were banning it, governments investigating, and shareholders suing. What should have been an endless series of victory laps turned instead into a PR crisis management tour of mea culpa that may forever tarnish the brand?
While the litany of security mistakes, privacy failures, and trust betrayals continues to grow, one of the most terrifying for new and would-be users is the detonation of a Zoom Bomb in the middle of an important online meeting.
Amongst the chorus of complaints about Zoom's poor and questionable Security and privacy decision was a surge in reports of online trolls disrupting Zoom video conferences with everything from offensive and threatening messages to online harassment. As the publicity around Zoom's security issues began to attract even more security experts and hackers curious to see how vulnerable the platform could really be, it soon became apparent why Zoombombing seemed such an easy stunt to pull off.
Related: How IT Can Enable A Remote Workforce
Welcome to 'War Dialing,' one of the oldest tools in the hacker arsenal. Because Zoom meeting numbers are simply a collection of up to 11 digits, researchers realized it was quite easy to identify the call-in numbers of real meetings. And especially if you automated the process. Krebs on Security claimed to be able to identify (and if necessary join or bomb) around 100 legitimate Zoom meetings in just 60 minutes using a custom dialler.
He also claimed that if he simply ran a number of the war dialing tools at the same time, he could pretty much discover all of the public or open Zoom meetings occurring every day. In one demonstration, he was able to access more than 2,400 Zoom meetings in a single day and many being hosted by banks, Fortune 500 firms, and governments agencies.
So how could a near-ten-year-old enterprise communications business run by some of the most experienced executives in the industry have missed such a gap? According to the firm, they didn't expect so many personal users and employees beyond the enterprise to start using the tool suddenly. Users who created additional risks because they didn't know how to enable Zoom's Security and privacy settings. Or because Zoom never told them they should and how they could.
A terrible collision of novice users and poor communications, or just a business more focused on hyper-growth without the baggage of intrusive Security and privacy?
So how did user mistakes turn into a new global game of bombing and trolling? It's mainly about Zoom settings. Users simply weren't aware that all Zoom meetings were publicly viewable, searchable, and accessible by default. In many cases, like a virtual town hall or school meetings, they needed to be just that way.
What now, what next for Zoom? As the company continues to put out multiple fires, it also promised to suspend all feature development for the next 90 days so its teams could focus instead on finding and fixing security gaps.
In the meantime, there are some necessary precautions all users should be taking now if they want to lock out the risk of a troll disruption:
As Executive Director of the non-profit Identity Theft Council, Neal has counseled thousands of victims of identity theft and taken on cases referred to him by the FBI and Secret Service. He has advised more than a dozen governments, as well as numerous security companies including ZoneAlarm, IdentityGuard, EZShield, SiteLock, SurfControl, Securify, NTRU Cryptosystems, Credit Sesame, and Civic. Neal is a former writer with SearchSecurity.com and Technical Editor for the Hack Proofing series of security guides (Elsevier).
Let our experts teach you how to use Sitefinity's best-in-class features to deliver compelling digital experiences.
Learn MoreSubscribe to get all the news, info and tutorials you need to build better business apps and sites