Huge Zoom flaw allows hackers to take over your Mac or PC completely [Update]

Huge Zoom flaw allows hackers to take over your Mac or PC completely [Update]

Updated comments from Zoom

Zoom has a brand new flaw that allows hackers to completely take over your PC or Mac

Two of them are Dutch security researchers Daan Keuper and Thijs Alkemade, who yesterday (April 7) demonstrated an exploit for this security flaw as part of the biannual Pwn2Own hacking contest

Indeed, Keuper and Alkemade cascaded three different flaws (some of which may have been known for some time) to gain full remote control of a PC through the Zoom desktop application Their exploits required no user interaction other than to confirm that the Zoom application was running

This is a tweet from the Pwn2Own competition, showing an animation of the hack The sudden activation of the calculator application indicates that the researcher took control of the machine However, the animation gives no clue as to how Keuper and Alkemade pulled it off

The exploit also works with the Zoom desktop client for Macs, Malwarebytes researcher Pieter Arntz explained in a blog post However, the browser version of the Zoom meeting client is not affected

Zoom itself is a major sponsor of this year's Pwn2Own competition, and while Zoom's website does not yet mention this exploit, Zoom officials are no doubt working to fix this flaw as soon as possible rules, software developers have 90 days to fix the flaw that was revealed during the contest

For their trouble, Keuper and Alkemade received $200,000, which must be a nice supplement to their day job at Dutch cybersecurity firm Computest

As long as Keuper, Alkemade, and Zoom's security team remain tight-lipped about how this exploit works, there is little chance that hackers will use it to take over computers running Zoom

For now, if you want to play it safe, use the Zoom browser interface rather than the Zoom desktop client (When you join an online meeting, Zoom will prompt you to install a desktop app, but you can ignore it)

The Pwn2Own competition is currently run by Trend Micro's Zero Day Initiative team and has been running since 2007

White hat hackers are given genuine machines and software, all fully patched, and must demonstrate their exploits in real time in front of a live audience The winner must share their method privately with the developer of the hacked software

After this article first appeared, Zoom contacted us to say: [Thank you Zero Day Thank you to the Zero Day Initiative for sponsoring Pwn2Own Vancouver 2021 We take security very seriously and are very appreciative of Computest's research

We are working to mitigate this issue with respect to our group messaging product, Zoom Chat; in-session chats in Zoom Meetings and Zoom Video Webinars are not affected by this issue In addition, the attack must originate from an authorized external contact or be part of the same organization account as the target

As a best practice, Zoom recommends that all users only accept contact requests from individuals they know and trust program, please send a detailed report to

Categories