Previous All Posts Next

Zoom Encryption Flaws Exposed During COVID-19 Surge

Posted: April 6, 2020 to News.

Tags: Work from Home, Digital Forensics, Compliance

It's a lot easier to get away with bad deeds when the attention isn't on you... Which is a lesson Zoom is learning right about now,  as the business booms in the wake of the global pandemic. In addition to all the other privacy concerns we outlined in our previous article about Zoom, a recent investigation into the video conferencing behemoth revealed that, not only is their "end-to-end encryption" claim a complete fabrication, but the actual keys they use to encrypt (and subsequently decrypt) "private" meetings are apparently being send to servers LOCATED IN CHINA, regardless of the participants' locations. And while the investigation revealed that there were only five servers in China, compared to 68 in the US, Zoom would often send the encryption keys to Beijing, even if their clients were in North America.

A Closer Look at Zoom's Encryption Issues

This isn't the only issue. Zoom's questionable encryption policies are really piling on top of each other. We mentioned in our previous article that there were some serious questions about Zoom's "end-to-end" encryption claim.  Lucky for us, Zoom "clarified" that its definition of "end-to-end" didn't match that of the cybersecurity community's generally agreed upon definition.  While the term generally implies that communication is protected in such a way that only the sender and his/her recipient(s) have access to the data, Zoom's definition of "end-to-end" apparently means that only communications meetings' participants and Zoom are encrypted. Not only is this misleading, to the point of being fraudulent, but it also give Zoom access to the unencrypted data, meaning that the communications have the potential to be monitored.  They state, nonetheless, that they, "never built a mechanism to decrypt live meetings for lawful intercept purposes.” And when discussing the actual methods used to encrypt data, Zoom lied again.  They stated that they used AES-256 encryption, when in fact, they are only using AES-128.  Additionally, they're using ECB mode.  This is a major problem because ECB is no longer seen as acceptable, because it has been shown to improperly hide data patterns, meaning it's easier to decode. So maybe you can understand why it's rather disconcerting that they are housing decryption keys in China? It's also worth pointing out that even though Zoom is a US-based company, three other companies they own, which are responsible for developing software, are based in China.  These companies are staffed by over 700 R&D employees, even though the vast majority of revenue comes from North America. Taken as a whole, Zoom's business dealings seem more than a bit sketchy.  We recommend doing everything in your power to secure your home office.  A great start is implementing the tips we recommend in our free Remote Security Checklist.  You can also call us any time at 919-422-2607, or schedule a free consultation with Craig by clicking here. And again, we are not (yet) telling you not to use Zoom, but it might not be a bad idea to start looking for alternatives, especially if privacy and security are important and/or necessary to your business.

Protect Your Business Today

Petronella Technology Group has provided cybersecurity, compliance, and managed IT services from Raleigh, NC for over 23 years. Contact us today for a free consultation and technology assessment.

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Need Cybersecurity or Compliance Help?

Schedule a free consultation with our cybersecurity experts to discuss your security needs.

Schedule Free Consultation
Previous All Posts Next
Free cybersecurity consultation available Schedule Now