- On April 1, researchers discovered a vulnerability where Windows users could have their operating system’s login password stolen with a malicious link sent on chat. CEO Yuan said that this issue has been patched.
- On April 2, the New York Times reported a feature where even anonymous participants in a call could siphon off LinkedIn data about other participants without their knowledge. Zoom later removed this feature.
- On March 31, The Intercept reported how Zoom was misleadingly claiming that calls were end-to-end encrypted, when they were not. The company later changed the language to say that “Your client connection is encrypted”.
- On March 31, security researcher Felix Seele discovered that Zoom’s macOS installation package was working around Apple’s requirements for installing apps by just extracting a compressed archive directly into Apple computers’ Applications folder, a tactic commonly employed by malware, and not legitimate software companies. CEO Yuan responded on Twitter and a fix was rolled out two days later.
- On March 26, a Motherboard investigation found that Zoom was sending user data to Facebook even if users were not logged in via the social media platform, or had an account there. Zoom updated the app to remove the Facebook Software Development Kit that was causing this data leak.
All this is in the last couple weeks alone. In July 2019, a flaw allowed attackers to get users’ Mac devices to open a call with their webcams switched on, leading Apple to issue a silent fix in addition to an emergency patch by Zoom.
Questions have been raised about Zoom’s privacy practises: On March 30, New York’s Attorney General Letitia James sent a letter to Zoom questioning its data privacy and security practices, the New York Times reported. She noted, among other things, that Zoom had been slow to address vulnerabilities “that could enable malicious third parties to, among other things, gain surreptitious access to consumer webcams [zoombombing].” She also questioned the categories of data that Zoom collects, and the entities with which it shares user data.
- Zoom allows activity tracking, access to recorded calls: Apart from the phenomenon of zoombombing — where public Zoom calls have been invaded by uninvited guests — Zoom has other potential privacy issues as well. Advocacy group, Electronic Frontier Foundation had earlier pointed out that the host of Zoom calls can monitor activities of attendees while screen sharing. If a user records any calls via Zoom, administrators can access the contents of that recorded call, including video, audio, transcript, and chat files, among other things. It also allows administrators to see the operating system, IP address, location data, and device information of each participant.
- Attention tracking feature: Zoom also has an “Attention tracking” feature that allows hosts to know when a participant does not have the Zoom window in focus during screen sharing.