Thousands of Zoom accounts are being sold on dark web

Credentials being traded include passwords and meeting URLs for established businesses.

Zoom: surged in popularity amid global lockdown
Zoom: surged in popularity amid global lockdown

A cybersecurity company has discovered huge volumes of Zoom account details and passwords being sold to hackers on the dark web – something that helps explain why there have been so many reports of "Zoombombing" recently.

Cyble told publisher BleepingComputer that it was able to purchase approximately 530,000 Zoom credentials – including stolen email addresses, passwords, personal meeting URLs and host keys – on the dark web for less than a penny each. It purchased the stolen credentials to warn its customers of a security breach. Cyble said the stolen accounts include ones for well-known companies such as Chase and Citibank, as well as educational institutions.

The company has also noticed account details being shared for free on hacker forums since the beginning of April.

It is believed that the stolen account details were gathered from past data breaches and linked to Zoom accounts that use the same email address and password combinations – a technique known as credential stuffing.

In a statement to BleepingComputer, Zoom stated that it has already hired intelligence companies to help find these password dumps so that they can reset affected users' passwords. Here's the full statement from Zoom:

"It is common for web services that serve consumers to be targeted by this type of activity, which typically involves bad actors testing large numbers of already compromised credentials from other platforms to see if users have reused them elsewhere. This kind of attack generally does not affect our large enterprise customers that use their own single sign-on systems.

"We have already hired multiple intelligence firms to find these password dumps and the tools used to create them, as well as a firm that has shut down thousands of websites attempting to trick users into downloading malware or giving up their credentials. We continue to investigate, are locking accounts we have found to be compromised, asking users to change their passwords to something more secure, and are looking at implementing additional technology solutions to bolster our efforts."

This is the latest in a string of privacy and security concerns surrounding Zoom, which has shot up in popularity as many countries around the world have entered lockdown. This includes privacy violations that apparently put Zoom in breach of the European Union's General Data Protection Regulation until recently.

The availability of stolen logins on the dark web could help explain why there have been so many reports of "Zoombombing" over the past few months, in which a hacker breaks into a private meeting to cause disruption. A recent incident in Singapore saw hackers intercept a school lesson and broadcast obscene pictures to students, leading the government to temporarily ban schools from using the video-conferencing tool. Singapore's education ministry is now allowing schools to progressively resume the use of Zoom after having introducing additional layers of defence.

A version of this article first appeared on Campaign Asia-Pacific