Wattha, A New Zoom Bug Makes Mac Users From Harlem To Harare More Vulnerable To Hackers

Zoom rapidly gained popularity during the COVID-19 pandemic as more consumers shifted to remote work.

However, users have faced several security and privacy issues over the years in connection to the service. Now, one researcher says a new bug is putting Mac users at risk. 

Patrick Wardle, the founder of the nonprofit organization Objective-See, stated at a recent DefCon event that a flaw in Zoom’s automatic update tool could allow hackers to infiltrate Mac computers.

Wardle explained that when this tool runs an update, it looks for a signing certificate – or a unique digital verification code – that matches Zoom

Since automatic updates do not require a password to be installed, Wardle says (no matter where you are in Harlem to Harare) hackers could create packages that mimic Zoom’s signing certificate to install malicious files or programs onto users’ Macs.

By submitting this form, you are consenting to receive marketing emails from: Harlem World Magazine, 2521 1/2 west 42nd street, Los Angeles, CA, 90008, https://www.harlemworldmagazine.com. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

This could allow them to completely take over the device to delete files, steal passwords, or alter documents. 

Get the latest version of Zoom

Wardle initially told Zoom about his findings back in December, which prompted the company to create a fix for the issue.

Unfortunately, that fix reportedly included a bug that still allowed the automatic updater vulnerability to be effective. 

Following Wardle’s DefCon presentation, Zoom issued a new patch under update 5.11.5 (9788).

Mac users should download this update immediately to protect themselves from hackers reports Consumer Affairs.

Related Articles

Leave a Reply