Your Video Conferencing Credentials Can be Found Selling on Dark Web.

Attackers are targeting “work from home space”. Thousands of passwords and usernames for Zoom accounts found for sale.


New York – COVID-19 pandemic has brought a new lifestyle with it. Good or bad, we don’t know. But what we do know is that it’s internet based and it’s certainly risky.

Most of us have been advised to quarantine or stay home to work from home. Organizations have found a way to securely connect with their employees and workflow is a process in progress.

While this all sounds comfortable, here’s what’s happening in the background:

Security firms monitoring online security confirmed that while companies are trying all sorts of methods to secure their mobile work ecosystem, attackers have found a way to infiltrate. As a result, thousands of video conferencing credentials are found to be sold online.

More than 2,300 Zoom accounts credentials have been found on Dark Web, suggests major threat to mobile operating companies.

Denial-of-service attacks and pranks, commonly known as “Zoom bombing” are prone to take place besides other threats like eavesdropping and social engineering, says Chief Security Officer of Threat Intelligent, Etay Maor.

What more can that lead to ?

As this problem grows, “Impersonation” is a major threat to look forward to. Once the attacker identifies the person who’s credentials have been stolen, the attacker can then pretend to pursue operations like moving files, classified information as well as money. All this can be easily done over Zoom chats.

For the most part, security is hard to add to the applications without dramatically impacting user experience, says Maor.

Video conferencing tools are so popular during COVID-19 time, that it has become a primary target for cyber attacks.

VPNs (Virtual Private Networks) and RDPs (Remote Desktop Protocols) are other heavily targeted areas of interest for cyber hackers.