From darkreading.com
Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers’ targets.
As the number of cases of Zoom bombing has risen and companies lock down their videoconferencing calls behind passwords, attackers are now posting and selling videoconferencing credentials online, two security firms said this week.
In one case, a cybercriminal posted a database on the Dark Web containing more than 2,300 usernames and passwords for Zoom accounts, stated threat-intelligence provider IntSights in a report posted today. The credentials could be used for denial-of-service attacks and pranks such as Zoom bombing, as well as potentially for eavesdropping and social engineering, says Etay Maor, chief security officer for global threat intelligence firm at IntSights.