20.3 C
New York
Friday, May 24, 2024

‘Zero-Click’ Zoom Vulnerabilities Could Have Exposed Calls

Most hacks require the victim to click on the wrong link or open the wrong attachment. But as so-called zero-click vulnerabilities—in which the target does nothing at all—are exploited more and more, Natalie Silvanovich of Google's Project Zero bug-hunting team has worked to find new examples and get them fixed before attackers can use them. Her list now includes Zoom, which until recently had two alarming, interactionless flaws lurking inside.

Though fixed now, the two vulnerabilities could have been exploited without any user involvement to take over a victim's device or even compromise a Zoom server that processes many users' communications in addition to those of the original victim. Zoom users have the option to turn on end-to-end encryption for their calls on the platform, which would keep an attacker with that server access from surveilling their communications. But a hacker could still have used the access to intercept calls in which users didn't enable that protection.

“This project took me months, and I didn't even get all the way there in terms of carrying out the full attack, so I think this would only be available to very well-funded attackers,” Silvanovich says. “But I wouldn’t be surprised if this is something that attackers are trying to do.”

Silvanovich has found zero-click vulnerabilities and other flaws in a number of communication platforms, including Facebook Messenger, Signal, Apple's FaceTime, Google Duo, and Apple's iMessage. She says she had never given much thought to evaluating Zoom because the company has added so many pop-up notifications and other protections over the years to ensure users aren't unintentionally joining calls. But she says she was inspired to investigate the platform after a pair of researchers demonstrated a Zoom zero-click vulnerability at the 2021 Pwn2Own hacking competition in April.

Silvanovich, who originally disclosed her findings to Zoom at the beginning of October, says the company was extremely responsive and supportive of her work. Zoom fixed the server-side flaw and released updates for users' devices on November 24. The company has released a security bulletin and told WIRED that users should download the latest version of Zoom.

Most mainstream video conferencing services are based at least in part on open source standards, Silvanovich says, making it easier for security researchers to vet them. But Apple's FaceTime and Zoom are both fully proprietary, which makes it much harder to examine their inner workings and potentially find flaws.

“The barrier to doing this research on Zoom was quite high,” she says. “But I found serious bugs, and sometimes I wonder if part of the reason I found them and others didn’t is that huge barrier to entry.”

You likely join Zoom calls by receiving a link to a meeting and clicking it. But Silvanovich noticed that Zoom actually offers a much more expansive platform in which people can mutually agree to become “Zoom Contacts” and then message or call each other through Zoom the same way you would call or text someone's phone number. The two vulnerabilities Silvanovich found could only be exploited for interactionless attacks when two accounts have each other in their Zoom Contacts. This means that the prime targets for these attacks would be people who are active Zoom users, either individually or through their organizations, and are used to interacting with Zoom Contacts. 

Most PopularBusinessThe End of Airbnb in New York

Amanda Hoover

BusinessThis Is the True Scale of New York’s Airbnb Apocalypse

Amanda Hoover

CultureStarfield Will Be the Meme Game for Decades to Come

Will Bedingfield

GearThe 15 Best Electric Bikes for Every Kind of Ride

Adrienne So

Organizations that use Zoom have the option of routing their communications through the company's servers or establishing and maintaining their own server through Zoom's “on-premises” options. Managing a Zoom server can help groups that need control for industry or regulatory compliance, or simply want to be in charge of their own data. But Silvanovich found that the vulnerabilities could be exploited not only to target individual devices, but to take control of these servers.

The concept of exploiting interactionless bugs is not new in offensive hacking, and recent attacks show how effective it can be. Examples have mounted in recent months of governments around the world purchasing and abusing targeted hacking tools and spyware to surveil activists, journalists, dissidents, and others. The underlying flaws have also proven to be more common than you might think in services that people rely on worldwide. 

“With each project, I keep thinking this is the thing that’s going to make me done with messaging or done with video conferencing,” Silvanovich says. “But then I or other people start to look at new avenues and it keeps going.”

Update January 18, 2022 at 5:45pm ET: This story has been updated to reflect that Zoom first made its patches available on November 24, not December 1.


More Great WIRED Stories📩 The latest on tech, science, and more: Get our newsletters!The race to find “green” heliumCovid will become endemic. What happens now?A year in, Biden's China policy looks a lot like Trump'sThe 18 TV shows we’re looking forward to in 202How to guard against smishing attacks👁️ Explore AI like never before with our new database📱 Torn between the latest phones? Never fear—check out our iPhone buying guide and favorite Android phones

Related Articles

Latest Articles