{"id":18070,"date":"2022-02-02T10:49:08","date_gmt":"2022-02-02T18:49:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11803\/"},"modified":"2022-02-02T10:49:08","modified_gmt":"2022-02-02T18:49:08","slug":"news-11803","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/02\/news-11803\/","title":{"rendered":"\u2018Zero-Click\u2019 Zoom Vulnerabilities Could Have Exposed Calls"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61e1f7de50297725e779e751\/master\/pass\/Security-Zoom-Zero-Touch-Vulnerabilities-1225504303.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 18 Jan 2022 17:04:27 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Most hacks require<\/span> the victim to click on the wrong link or open the wrong attachment. But as so-called <a href=\"https:\/\/www.wired.com\/story\/sneaky-zero-click-attacks-hidden-menace\/\">zero-click vulnerabilities<\/a>\u2014in which the target does nothing at all\u2014are <a href=\"https:\/\/www.wired.com\/story\/apple-imessage-zero-click-hacks\/\">exploited more and more<\/a>, Natalie Silvanovich of Google&#x27;s Project Zero bug-hunting team has worked to find new examples and get them fixed before attackers can use them. Her list <a data-offer-url=\"https:\/\/googleprojectzero.blogspot.com\/2022\/01\/zooming-in-on-zero-click-exploits.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/googleprojectzero.blogspot.com\/2022\/01\/zooming-in-on-zero-click-exploits.html&quot;}\" href=\"https:\/\/googleprojectzero.blogspot.com\/2022\/01\/zooming-in-on-zero-click-exploits.html\" rel=\"nofollow noopener\" target=\"_blank\">now includes Zoom<\/a>, which until recently had two alarming, interactionless flaws lurking inside.<\/p>\n<p class=\"paywall\">Though fixed now, the two vulnerabilities could have been exploited without any user involvement to take over a victim&#x27;s device or even compromise a Zoom server that processes many users&#x27; communications in addition to those of the original victim. Zoom users have the option to turn on end-to-end encryption for their calls on the platform, which would keep an attacker with that server access from surveilling their communications. But a hacker could still have used the access to intercept calls in which users didn&#x27;t enable that protection.<\/p>\n<p class=\"paywall\">\u201cThis project took me months, and I didn&#x27;t even get all the way there in terms of carrying out the full attack, so I think this would only be available to very well-funded attackers,\u201d Silvanovich says. \u201cBut I wouldn\u2019t be surprised if this is something that attackers are trying to do.\u201d<\/p>\n<p class=\"paywall\">Silvanovich has found zero-click vulnerabilities and other flaws in a number of communication platforms, including <a href=\"https:\/\/www.wired.com\/story\/facebook-messenger-bug-bounty\/\">Facebook Messenger<\/a>, <a href=\"https:\/\/www.wired.com\/story\/signal-facebook-messenger-eavesdropping-vulnerabilities\/\">Signal, Apple&#x27;s FaceTime, Google Duo<\/a>, and <a href=\"https:\/\/www.wired.com\/story\/imessage-interactionless-hacks-google-project-zero\/\">Apple&#x27;s iMessage<\/a>. She says she had never given much thought to evaluating Zoom because the company has added so many pop-up notifications and other protections over the years to ensure users aren&#x27;t unintentionally joining calls. But she says she was inspired to investigate the platform after a pair of researchers <a data-offer-url=\"https:\/\/www.zerodayinitiative.com\/blog\/2021\/4\/2\/pwn2own-2021-schedule-and-live-results\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.zerodayinitiative.com\/blog\/2021\/4\/2\/pwn2own-2021-schedule-and-live-results&quot;}\" href=\"https:\/\/www.zerodayinitiative.com\/blog\/2021\/4\/2\/pwn2own-2021-schedule-and-live-results\" rel=\"nofollow noopener\" target=\"_blank\">demonstrated a Zoom zero-click<\/a> vulnerability at the 2021 Pwn2Own hacking competition in April.<\/p>\n<p class=\"paywall\">Silvanovich, who originally disclosed her findings to Zoom at the beginning of October, says the company was extremely responsive and supportive of her work. Zoom fixed the server-side flaw and released updates for users&#x27; devices on November 24. The company has released a security bulletin and told WIRED that users should download the latest version of Zoom.<\/p>\n<p class=\"paywall\">Most mainstream video conferencing services are based at least in part on open source standards, Silvanovich says, making it easier for security researchers to vet them. But Apple&#x27;s FaceTime and Zoom are both fully proprietary, which makes it much harder to examine their inner workings and potentially find flaws.<\/p>\n<p class=\"paywall\">\u201cThe barrier to doing this research on Zoom was quite high,\u201d she says. \u201cBut I found serious bugs, and sometimes I wonder if part of the reason I found them and others didn\u2019t is that huge barrier to entry.\u201d<\/p>\n<p class=\"paywall\">You likely join Zoom calls by receiving a link to a meeting and clicking it. But Silvanovich noticed that Zoom actually offers a much more expansive platform in which people can mutually agree to become \u201cZoom Contacts\u201d and then message or call each other through Zoom the same way you would call or text someone&#x27;s phone number. The two vulnerabilities Silvanovich found could only be exploited for interactionless attacks when two accounts have each other in their Zoom Contacts. This means that the prime targets for these attacks would be people who are active Zoom users, either individually or through their organizations, and are used to interacting with Zoom Contacts.\u00a0<\/p>\n<p class=\"paywall\">Organizations that use Zoom have the option of routing their communications through the company&#x27;s servers or establishing and maintaining their own server through Zoom&#x27;s \u201con-premises\u201d options. Managing a Zoom server can help groups that need control for industry or regulatory compliance, or simply want to be in charge of their own data. But Silvanovich found that the vulnerabilities could be exploited not only to target individual devices, but to take control of these servers.<\/p>\n<p class=\"paywall\">The concept of <a href=\"https:\/\/www.wired.com\/story\/sneaky-zero-click-attacks-hidden-menace\/\">exploiting interactionless bugs<\/a> is not new in offensive hacking, and recent attacks show how effective it can be. Examples have mounted <a href=\"https:\/\/www.wired.com\/story\/nso-group-spyware-pegasus-state-department\/\">in recent months<\/a> of governments around the world <a href=\"https:\/\/www.wired.com\/story\/nso-group-hacks-ios-android-observability\/\">purchasing<\/a> and abusing <a href=\"https:\/\/www.wired.com\/story\/nso-group-forcedentry-pegasus-spyware-analysis\/\">targeted hacking tools<\/a> and <a href=\"https:\/\/www.wired.com\/story\/nso-group-pegasus-el-salvador\/\">spyware to surveil<\/a> activists, journalists, dissidents, and others. The underlying flaws have also proven to be more common than you might think in services that people rely on worldwide.\u00a0<\/p>\n<p class=\"paywall\">\u201cWith each project, I keep thinking this is the thing that\u2019s going to make me done with messaging or done with video conferencing,\u201d Silvanovich says. \u201cBut then I or other people start to look at new avenues and it keeps going.\u201d<\/p>\n<p class=\"paywall\"><em><strong>Update January 18, 2022 at 5:45pm ET:<\/strong> This story has been updated to reflect that Zoom first made its patches available on November 24, not December 1.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/zoom-zero-click-vulnerabilities\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/61e1f7de50297725e779e751\/master\/pass\/Security-Zoom-Zero-Touch-Vulnerabilities-1225504303.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Tue, 18 Jan 2022 17:04:27 +0000<\/strong><\/p>\n<p>The flaws are now fixed, but they speak to the growing concerns around interactionless attacks.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18070","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18070"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18070\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18070"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}