Credential stuffing against Zoom accounts
Standard high-volume background attack. Zoom credentials harvested from breach databases tested at scale. Disproportionately successful against users who reuse passwords across services.
How attackers hijack Zoom accounts, crash meetings, and abuse recording access — and how to defend yours.
Zoom accounts span personal use, work-from-home tooling, and enterprise deployment — three distinct threat models sharing one product name. Compromise of a Zoom account grants access to stored recordings (often including sensitive business or personal conversations), scheduled meetings (attacker can join and eavesdrop), contacts list, and in organisation contexts, potentially administrative access to tenant settings affecting many users.
The realistic threat profile is dominated by credential-based attacks — credential stuffing from breach databases, phishing for Zoom credentials via fake meeting invites, and targeting the email accounts that allow Zoom password reset. Meeting-crashing ("Zoombombing") is a separate concern, typically enabled by meeting links shared too broadly rather than account compromise per se, but the controls overlap substantially.
Zoom has meaningfully improved its security posture since the 2020 scrutiny it received — end-to-end encryption for meetings is now widely available, default settings are stronger, and phishing-resistant MFA support has expanded. Users taking advantage of these capabilities have a defensibly-secure product; users running on default configurations from years ago often do not. Worth a security review for anyone using Zoom for anything sensitive.
Conceptual attack categories, not exploitation procedures. Understanding these patterns is what lets you recognise and defend against them.
Standard high-volume background attack. Zoom credentials harvested from breach databases tested at scale. Disproportionately successful against users who reuse passwords across services.
Fake Zoom meeting invitations leading to credential-harvesting pages. Emails appear to be from colleagues or clients; clicking through leads to fake Zoom login. Effective because users are conditioned to clicking Zoom links frequently during business hours.
Not account compromise per se — attackers discover meeting IDs (weakly randomised early in Zoom's history; stronger now) and join meetings. Disrupts meetings, embarrasses organisations, leaks information. Mitigated by waiting rooms, meeting passwords, authenticated-users-only restrictions.
Same pattern as other cloud accounts — info-stealers on user endpoints exfiltrate Zoom session tokens. Attacker replay without needing password or MFA. Countered by endpoint security and session-binding controls.
Cloud recordings are a high-value target post-compromise — often contain confidential business conversations, medical consultations, legal discussions, interviews with sensitive content. Attacker downloads everything accessible.
Zoom Marketplace apps request permissions on install. Overly-permissive or later-compromised apps can abuse meeting access, recording access, or contact-list access. Review installed apps periodically.
Public-figure meetings (webinars, press conferences) sometimes have links or passcodes shared publicly, enabling uninvited-attendee scenarios. Operational security mistake more than a technical attack, but the consequence looks the same.
Signs that your zoom accounts may have been compromised:
Zoom sends login notification emails. Any login you did not make warrants immediate password change.
Attackers schedule meetings under your account for phishing or impersonation. Review meeting list monthly.
Downloaded or deleted recordings you did not touch = attacker access. Check recording inventory periodically for users who store sensitive content.
Zoom settings changes you did not make (background, profile info, connected apps) — all investigate.
Attacker monetisation via account upgrades, or seat additions for their own use.
Concrete actions ranked by impact. Items marked critical are the highest-leverage protections; do those first.
Zoom supports TOTP 2FA (minimum) and SSO for organisations. Enable immediately; prefer authenticator app over SMS.
Defeats credential stuffing. Zoom credentials should not be reused from any other service.
Zoom password reset runs through email. Email security (2FA, unique password, secure recovery) undergirds Zoom security.
For meetings with sensitive content: enable passwords, enable waiting rooms, restrict to authenticated users only. Defeats Zoombombing and most casual intrusion.
Zoom supports E2EE for meetings (some feature limitations apply — no dial-in, no cloud recording, no live transcription). For legal, medical, and high-sensitivity conversations, E2EE is worth the trade-offs.
Zoom → Settings → Integrations / Marketplace. Revoke apps not actively used.
Public webinars should use Registration or Webinar features (rather than Meeting features) so links do not propagate freely.
For highly sensitive meetings, download recordings after the meeting and store in secured storage rather than leaving in Zoom Cloud indefinitely.
Zoom has had notable desktop-app vulnerabilities patched over the years. Auto-update is the safest default.