In the last month, there was a 535 percent rise in daily traffic to the Zoom.us download page, according to an analysis from the analytics firm SimilarWeb. Its app for iPhone has been the most downloaded app in the country for weeks, according to the mobile app market research firm Sensor Tower. Even politicians and other high profile figures, including the British prime minister, Boris Johnson, and the former US federal reserve chair Alan Greenspan, use it for conferencing as they work from home.
On Monday, New York’s attorney general, Letitia James, sent a letter to the company asking it to outline the measures it had taken to address security concerns and accommodate the rise in users. In the letter, James said Zoom had been slow to address security vulnerabilities “that could enable malicious third parties to, among other things, gain surreptitious access to consumer webcams”.
A spokesman from Zoom told the Guardian on Wednesday it was planning to send James the requested information and comply with the request. “Zoom takes its users’ privacy, security, and trust extremely seriously”, the spokesman said. “During the Covid-19 pandemic, we are working around the clock to ensure that hospitals, universities, schools and other businesses across the world can stay connected and operational.”
And on Thursday, the company announced it would freeze all new feature development and shift all engineering resources on to security and safety issues that have been called to attention in recent weeks.
The problem is that Zoom meetings can be accessed by a short number-based URL, which can easily be generated and guessed by hackers, a January report from the security firm Checkpoint found. Zoom has released guidelines in recent days about how to prevent unwanted guests from crashing video meetings and a spokesman told the Guardian it had also been working to educate its users on protections through blogposts and webinars.
Zoom falsely advertised itself as using end-to-end encryption, a system that secures communication so that it can only be read by the users involved, a report from the Intercept found. Zoom confirmed in a blogpost on Wednesday that end-to-end encryption was not currently possible on the platform and apologised for the “confusion” it caused by “incorrectly” suggesting the opposite.
A number of security flaws affecting Zoom have been reported in the past and as recently as this week. In 2019, it was revealed Zoom had quietly installed a hidden web server on user devices that could allow the user to be added to a call without their permission. And a bug discovered this week would enable hackers to take over a Zoom user’s Mac, including tapping into the webcam and hacking the microphone.
The company said on Thursday it had issued a release to fix the Mac issue, but the number of security issues with Zoom in the past make it as bad as malicious software.
Arvind Narayanan, an associate computer science professor at Princeton University said: " “Let’s make this simple”, he said. “Zoom is malware.”
Zoom has been slammed for its “attention tracking” feature, which allows a host to see if a user clicks away from a Zoom window for 30 seconds or more.
This feature would allow employers to check if employees are really tuned into a work meeting or if students are really watching a classroom presentation remotely.
Another report from Motherboard found Zoom sends data from users of its iOS app to Facebook for advertising purposes, even if the user does not have a Facebook account.
Motherboard story was cited in a lawsuit filed in a federal court in California this week, accusing Zoom of failing to “properly safeguard the personal information of the increasing millions of users” on its platform.
This privacy flaw was also mentioned in the letter from James, which noted such privacy violations could be of particular concern as schools migrate to Zoom for class.