Course Hero Logo

That could be exploited by black hat hackers or

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 4 - 6 out of 8 pages.

that could be exploited by Black Hat Hackers or malicious users. According to Nigh (2020), some of thesecurity concerns with Zoom are listed below:Zoombombing– Black hat hackers or malicious users were able to enter a chat and harass others anddisrupt the meeting.Hyperlinks in chats– A hyperlinked Universal Naming Convention (UNC) path could be shared to stealthe user’s credentials and/or inject malware into the victim’s computer.Backdoor– A vulnerability only for Macs that allowed Zoom to bypass normal authentication orencryption keys.End-to-End Encryption– Zoom claimed the meetings were using end-to-end encryptions for eachmeeting but Zoom is still able to handle the data prior to encrypting it and then sending it. The provider ina traditional end-to-end encryption would not be able to access such information but in this case, Zoomemployees with malicious intent may be able to view personal/sensitive information.
Threat Vectors, Ideologies, andIdeologies of a Black Hat HackerIn this incident, it is clear what the Black Hat Hacker’sintent was. According to Winder (2020), the 500,000 usercredentials that were stolen were sold online.When Zoom became a popular application to utilizeduring the initial COVD pandemic, Black Hat Hackerstook the opportunity to exploit Zoom and their users.According to Winder (2020), the process of users usingtheir same credentials for multiple accounts is known asthe “Schrödinger’s credentials”. Black Hat Hackers tookadvantage of the user’s complacency over creatingunique and strong passwords and were able to exploitmultiple users.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
Sean Atkinson
Tags
Computer Security, Hacker, Black hat, ZOOM, Compromised Zoom Credentials

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture