In case the video conference software “Zoom” did not have enough negative headlines up its sleeve, user data is now being traded on the Dark Web. And not a few. Over half a million data records are available there. But given the huge volume, the price of the information is very cheap.
The data that users store with Zoom may be as important as data elsewhere. Some users use email addresses and passwords several times. So why shouldn’t hackers try to log in with the same information on social networks or other websites?
More than 500,000 Zoom accounts in sale on the dark web
As has now become known, 530,000 zoom account data are sold on the Dark Web, for just under 0.002 US cents each. It includes email addresses, passwords, the personal conference URL and the HostKey, which authorizes the user as the leader of a conference.
However, while individuals generally only endanger themselves and their friends or family members, institutional zoom users are still at risk of collateral damage. According to a media report, employees of companies such as Chase, Citibank or schools and universities are among those affected. Corporate computers or networks could also fall victim to hackers’ curiosity.
The advice that we can give is to change the passwords given to Zoom. And also informs your colleagues and superiors if they come up with the idea of using Zoom. Because the video conference app has already massive data protection violations behind it. Google has already pulled the ripcord, prohibiting employees from using the app. But “zoom bombing” may initially increase again rather than decrease.
It is highly recommended to use a different password for each website or service. This way, the risk remains small and limited to one service rather than spreading to all the services that the user subscribes to.