![]() ![]() … We have already hired multiple intelligence firms to find these password dumps and the tools used to create them. "It is common for web services that serve consumers to be targeted by this type of activity. ![]() The include a victim's email address, password, personal meeting URL, and their HostKey. The successful logins are then compiled into lists that are sold to other hackers. What’s the craic? Lawrence Abrams reports- Over 500,000 Zoom accounts sold on hacker forums, the dark web: These credentials are gathered through credential stuffing attacks where threat actors attempt to login to Zoom using accounts leaked in older data breaches. Your humble blogwatcher curated these bloggy bits for your entertainment. Yikes.īut is this merely a pile-on situation? In this week’s Security Blogwatch, we examine the case for the defense. This comes hot on the heels of recent previous “scandals”-selling PII to Facebook, being a conduit for malware, using a secret pseudo sudo, lying about using E2EE, and routing calls through China. It seems hackers have discovered half a million compromised, reused credentials matching Zoom accounts. The latest bad press for the videoconference service is about reused username/password pairs.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |