01 Aug / 2023
Information that may be collected from the user’s email client includes the following, if available:
This is not entirely transparent on the part of ZoomInfo. Risk assessments performed by sandboxing tools, indicates further information that ZoomInfo attempts to extract via their application. This includes Microsoft Edge browser history, email credentials and system information. On their website, ZoomInfo claim “we do not track personal browsing history”. ZoomInfo claims to only scrape email headers and signature blocks that are received by community members in addition to claiming that bots analyse that information.
ZoomInfo claim that user’s can “opt out” of their service and have their profile removed from the database. One of Cythera’s SOC Analysts has initiated this process on their own profile and is pending a response from ZoomInfo.
To be clear, there are legitimate use cases for other products in ZoomInfo’s lineup. This blog is to specifically address the “free” Community Edition.
Implement application level blocks via Endpoint Management tools like Intune and Desktop Central to prevent the application from being installed. Cythera recommend blocking the following:
Implement blocks at the network level to prevent the application attempting to install in the first place. Cythera recommends outbound blocks to the following domains:
Additionally, Cythera are actively hunting for the suspicious indicators associated with ZoomInfo for our customers and we are developing detection rules for our Managed Detection and Response customers.
If you have any questions or concerns, please feel free to reach out to us.
Security Legislation In Australia: Making Sense of the Options and Obligations
In the realm of cyber security, frameworks serve as the backbone for creating, enhancing, and maintaining security protocols. For Australian sec…Read More
Cythera Announces Partnership with Abnormal Security
Cythera are proud to announce a new technology partnership with Abnormal Security, bringing next generation email protection to our clients.Cyth…Read More
FORTIGUARD FIREWALL HEAP-BASED BUFFER OVERFLOW VULNERABILITY - CVE-2022-25610
FORTIGUARD FIREWALL HEAP-BASED BUFFER OVERFLOW VULNERABILITY CVE: CVE-2022-25610What is VulnerableFortiOS version 7.2.0 through 7.2.3FortiOS ve…Read More