Over 500,000 Zoom accounts are offering on the dark web and hacker forums for much less than a penny each, and in a few cases, given away without cost.

These credentials collected through credential stuffing attacks wherein threat actors try to login to Zoom, the use of accounts leaked in older information breaches. The successful logins then compiled into lists that offered to sell for other hackers.

Zoom Said: “it is not unusual for internet services that serve customers to be focused by this type of activity, which typically involves bad actors testing massive numbers of already compromised credentials from different platforms to peer if users have reused them elsewhere. This sort of attack normally does no longer affect our big organization clients that use their single signal-on systems. We’ve already employed multiple intelligence firms to locate those password dumps and the tools used to create them, as well as a company that has shut down hundreds of websites trying to trick users into downloading malware or giving up their credentials. We continue to investigate, are locking accounts we’ve observed to be compromised, asking users to change their passwords to something more secure, and are searching at implementing new technology solutions to reinforce our efforts.”

A number of those Zoom accounts provided free on hacker forums so that hackers can use them in zoom-bombing pranks and malicious activities. Others sold for much less than a penny each.

Cybersecurity intelligence company Cyble informed BleepingComputer that around April 1st, 2020, they commenced to look for free Zoom accounts being published on hacker forums to gain a multiplied reputation inside the hacker network community group.

Those accounts are shared through textual content sharing websites wherein the threat actors are posting lists of email addresses and password combinations.

Read: GoPro lays off 200 employees due to Coronavirus

BleepingComputer has contacted random email addresses exposed in those lists and has confirmed that some of the credentials have been accurate.

One exposed user informed BleepingComputer that the listed password turned into an old one, which suggests that some of those credentials are probably from earlier credential stuffing attacks.

After seeing a supplier posting accounts on a hacker forum, Cyble reached out to purchase a massive number of reports in bulk so that they can be used to warn their clients of the ability breach.

Cyble turned into capable of purchasing approximately 530,000 Zoom credentials for much less than a penny, each at $0.0020, according to account.

The bought accounts consist of a victim’s email address, password, personal meeting URL, and their HostKey. Cyble has advised BleepingComputer that those accounts include one’s high profile companies along with Citibank, academic institutions, and more.

For the accounts that belonged to customers of Cyble, the intelligence company turned into able to verify that they were legitimate account credentials.

In a declaration to BleepingComputer, Zoom said that they have already employed intelligence corporations to assist in discovering these password dumps that allow you to reset affected user passwords.

As all organizations are suffering from credential stuffing attacks, you need to use specific passwords for every website which you sign in an account.

With these attacks using accounts exposed in past information breaches and then sold online, the usage of a unique password at every website online will prevent an information breach from one web page affecting you on another web page.

Each service will list information breaches containing your email address and, besides, confirm that your credentials have probably exposed.