CHKP Check Point Software Technologies Ltd.

Check Point Research and Zoom Collaborate to Fix ‘Vanity URL’ Issue

Check Point Research and Zoom Collaborate to Fix ‘Vanity URL’ Issue

Check Point and Zoom identified an issue in Zoom’s customizable URL feature which could have potentially been exploited by hackers to manipulate meeting ID links to use for phishing purposes

SAN CARLOS, Calif., July 16, 2020 (GLOBE NEWSWIRE) -- Check Point Research, the Threat Intelligence arm of (NASDAQ: CHKP), recently helped to mitigate risk associated with a potential security issue in Zoom’s customizable ‘’ feature that could have allowed hackers to send legitimate-looking business meeting invitations that appear as associated with a particular Zoom user with the aim of inserting malware and surreptitiously stealing data or credentials from that user. Previously, Check Point Research to fix a different potential vulnerability that could have allowed hackers to join a meeting uninvited.

Zoom usage has exploded during the global Covid-19 lockdowns, from 10 million daily meeting participants in December 2019 to in April 2020. Cybercriminals are using this popularity as phishing lure for Zoom and other video communication platform users. According to Check Point, Zoom-related domain registrations and fake Zoom installation programs, in particular, have been the subject of .

The new potential Vanity URL security issue was found by researchers following up on the prior January collaboration. This potential security issue could have allowed a hacker to attempt to manipulate a Vanity URL (e.g., ) in two ways:

  • Targeting via direct links: when setting up a meeting, the hacker could change the invitation URL to include a registered sub-domain of their choice. In other words, if the original link was /j/##########, the attacker could change it to https://.zoom.us/j/##########. Without particular cybersecurity training on how to recognize the appropriate URL, a user receiving this invitation may not recognize that the invitation was not genuine or issued from an actual or real organization.
  • Targeting dedicated Zoom web interfaces: some organizations have their own Zoom web interface for conferences. A hacker could target such an interface and attempt to redirect a user to enter a meeting ID into the malicious Vanity URL rather than the actual or genuine Zoom web interface. As with the direct links attacks, without careful cybersecurity training, a victim of such attacks may not have been able to recognize the malicious URL and have fallen prey to the attack.

Using either method a hacker could attempt to pose as an employee of a potential victim organization via Zoom, and give the hacker a vector for stealing credentials or sensitive information.

Adi Ikan, Network Research & Protection Group Manager at Check Point said: “Because Zoom has become one of the world’s leading communication channels for businesses, governments and consumers, it’s critical that threat actors are prevented from exploiting Zoom for criminal purposes. Working together with Zoom’s security team, we have helped Zoom provide users globally with a safer, simpler and trusted communication experience so they can take full advantage of the service’s benefits.”

Check Point Research and Zoom worked together to resolve these issues. Zoom has addressed the issue and put additional safeguards in place for the protection of users.

“This was a joint-effort between Check Point and Zoom. Together, we’ve taken important steps to protect users of Zoom everywhere,” said Adi Ikan.

Read the technical details of the security issues in our .

  

Follow Check Point Research via:

Blog:

Twitter:

Podcast:

Facebook:

About Check Point Research

Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Ekram AhmedKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
+1 650.628.2041+1 650.628.2040
EN
16/07/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Technologies Receives Common Criteria EAL4+ Certi...

Check Point Software Technologies Receives Common Criteria EAL4+ Certification for Quantum Firewall Software R82 Certification expands global assurance for Check Point’s security platform, supporting trusted deployment in high-assurance environments across more than 30 nations REDWOOD CITY, Calif., May 01, 2025 (GLOBE NEWSWIRE) -- . (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that its Quantum Firewall Software R82, the latest version of Check Point’s core network security software delivering advanced threat prevention and scalable policy mana...

 PRESS RELEASE

Check Point Research Launches AI Security Report: Exposing the Rise of...

Check Point Research Launches AI Security Report: Exposing the Rise of AI-Powered Cybercrime and Defenses New report unveils four key AI-driven cyber threats and how organizations can outsmart attackers in an AI-driven world SAN FRANCISCO, April 30, 2025 (GLOBE NEWSWIRE) -- RSA CONFERENCE, – (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today launched its inaugural at RSA Conference 2025. This report offers an in-depth exploration of how cyber criminals are weaponizing artificial intelligence (AI), alongside strategic insights for defenders to stay ahead. A...

 PRESS RELEASE

Check Point Software Achieves FedRAMP “In Process” Milestone to Delive...

Check Point Software Achieves FedRAMP “In Process” Milestone to Deliver AI-Powered Cyber Security Solutions to U.S. Government The Check Point Infinity Platform for Government will deliver industry-leading threat prevention, zero trust architecture and AI-powered cyber defense REDWOOD CITY, Calif., April 28, 2025 (GLOBE NEWSWIRE) -- . (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it has achieved “In Process” status for the Federal Risk and Authorization Management Program (FedRAMP) Moderate baseline. This designation signifies a significant s...

 PRESS RELEASE

Check Point Software Technologies and Illumio Accelerate Zero Trust Ad...

Check Point Software Technologies and Illumio Accelerate Zero Trust Adoption with Proactive Threat Prevention and Unified Intelligence Integration accelerates breach identification and containment, effectively stops lateral movement of threats across the enterprise REDWOOD CITY, Calif., April 24, 2025 (GLOBE NEWSWIRE) -- . (NASDAQ: CHKP), a global leader in cyber security solutions, and , the breach containment company, today announced a strategic partnership to help organizations strengthen security and advance their Zero Trust posture. The integration between the Check Point Infinity ...

Wedbush Research
  • Wedbush Research

ResearchPool Subscriptions

Get the most out of your insights

Get in touch