

Thus, a bad actor will not be able to quickly narrow the pool of meetings to attempt to join. For each attempt, the page will load and attempt to join the meeting.

In summary, a hacker could eavesdrop into a Zoom meeting by following three easy steps: Researchers found that around 4% of their randomly-generated meeting IDs led to a genuine Zoom meeting ID. Researchers at Check Point learned that a hacker could pre-generate a long list of Zoom Meeting ID numbers, use automation techniques to quickly verify if a respective Zoom Meeting ID was valid or not, and then gain entry into Zoom meetings that were not password protected.

Typically, these ID numbers comprise of 9, 10 and 11-digit numbers. Zoom meeting IDs are access points for Zoom meeting participants. Check Point Research identified a major security flaw in Zoom, the video conferencing service used by over 60% of the Fortune 500.Ĭheck Point's researchers were able to prove that hackers could easily generate and verify Zoom Meeting IDs to target victims, enabling a hacker to eavesdrop on Zoom meetings, giving them intrusive access to all audio, video and documents shared throughout the duration of the meeting.
