Zoom
Communication and Collaboration
Zoom - Video conferencing tool for remote meetings and webinars
Provider: Zoom
| Detection Rule | MITRE Tactic | MITRE Technique | Criticality | ||||
|---|---|---|---|---|---|---|---|
| MFA Failure | Credential Access | T1556.001 – Multi-Factor Authentication | High | ||||
|
|||||||
| New Device Login | Persistence | T1078 – Valid Accounts | Medium | ||||
|
|||||||
| Unusual Geolocation Access | Defense Evasion | T1027 – Obfuscated Files or Information | Medium | ||||
|
|||||||
| Meeting Bombing Attempts | Impact | T1499 – Endpoint Denial of Service | High | ||||
|
|||||||
| Suspicious Meeting Links | Phishing | T1566 – Phishing | High | ||||
|
|||||||
| Data Leakage (Screen/File Sharing) | Exfiltration | T1071 – Application Layer Protocol | Critical | ||||
|
|||||||
| High Number of Participants | Impact | T1070.004 – Indicator Removal on Host | Medium | ||||
|
|||||||
| API Key Misuse | Credential Access | T1078 – Valid Accounts | Critical | ||||
|
|||||||
| Admin Account Changes | Privilege Escalation | T1078.004 – Valid Accounts: Cloud Accounts | Critical | ||||
|
|||||||
| Configuration Drift | Persistence / Defense Evasion | T1484.001 – Domain Policy Modification | High | ||||
|
|||||||
| Recording Retrieval | Collection | T1071.004 – Video Capture | Medium | ||||
|
|||||||
| Unusual Meeting Time Activity | Defense Evasion | T1027 – Obfuscated Files or Information | Medium | ||||
|
|||||||
| Anomalous File Transfer | Exfiltration | T1041 – Exfiltration Over Web Service | High | ||||
|
|||||||
| External Participant Spike | Reconnaissance | T1595 – Active Scanning | Medium | ||||
|
|||||||
| Suspicious Admin API Calls | Privilege Escalation / Execution | T1078.004 – Cloud Accounts | High | ||||
|
|||||||
APIs and Their Scopes
| Detection / Hunting Rule | Required API | Scopes Required | Description |
|---|---|---|---|
| MFA Failure | GET /users/{userId}/login_history | user:read:admin | Retrieves user login history to identify MFA failures. |
| New Device Login | GET /users/{userId}/login_history | user:read:admin | Accesses login history to check for new device logins. |
| Unusual Geolocation Access | GET /users/{userId}/login_history | user:read:admin | Retrieves geolocation data for user logins. |
| Meeting Bombing Attempts | GET /report/meetings | meeting:read:admin | Accesses meeting report data to analyze participant activity. |
| Suspicious Meeting Links | GET /meetings/{meetingId} | meeting:read:admin | Retrieves meeting details, including chat logs and invites. |
| Data Leakage (Screen/File Sharing) | GET /report/meetings | meeting:read:admin | Retrieves meeting reports to check for screen/file sharing activities. |
| High Number of Participants | GET /report/meetings | meeting:read:admin | Accesses meeting participant lists to analyze spikes in attendance. |
| API Key Misuse | GET /users/{userId}/api_keys | user:read:admin | Retrieves API key usage details for the user. |
| Admin Account Changes | GET /users/{userId}/activity_logs | user:read:admin | Accesses admin activity logs for changes made by privileged accounts. |
| Configuration Drift | GET /accounts/{accountId}/settings | account:read:admin | Retrieves current security settings for the account. |
| Recording Retrieval | GET /meetings/{meetingId}/recordings | recording:read:admin | Accesses recordings for specific meetings. |
| Unusual Meeting Time Activity | GET /report/meetings | meeting:read:admin | Retrieves meeting logs to identify unusual activity patterns. |
| Anomalous File Transfer | GET /report/meetings | meeting:read:admin | Accesses meeting reports to check for file transfers. |
| External Participant Spike | GET /report/meetings | meeting:read:admin | Retrieves meeting reports to analyze external participant logs. |
| Suspicious Admin API Calls | GET /users/{userId}/activity_logs | user:read:admin | Accesses logs of admin API calls to track unusual activities. |
Reports and Widgets for CISO
| Report Name | Widgets | Description / Insights for CISO |
|---|---|---|
| User Access & Login Activity | Failed Login Attempts (Bar/Line chart) | Provides a detailed view of user login attempts, geolocation, and new devices accessing Zoom. Highlights potential brute-force attacks or unauthorized access attempts. |
|
Successful Logins by Geolocation (Map) New Device Logins (Pie chart) |
||
| Multi-Factor Authentication (MFA) Overview | MFA Failure Rate (Bar chart) | Tracks MFA authentication attempts and any suspicious patterns related to MFA failures or accounts bypassing MFA. Ensures secure access management. |
|
Successful MFA Logins (Line chart) MFA Exceptions (Table) |
||
| Meeting Security Report | Suspicious Meeting Activity (Table) | Monitors meeting activities with a focus on unauthorized access attempts (e.g., meeting bombing), high participation anomalies, and general meeting security trends. |
|
Unauthorized Meeting Join Attempts (Bar chart) High Participant Count (Line chart) |
||
| Data Sharing & Exfiltration | File Sharing Activity (Bar chart) | Tracks all file and screen sharing activities to identify potential data exfiltration or inappropriate sharing of sensitive information during meetings. |
|
Screen Sharing Usage (Pie chart) External File Transfers (Table) |
||
| Zoom API Usage & Misuse | API Key Usage (Line chart) | Provides insight into Zoom API key usage and identifies any misuse or anomalous API activity that could indicate compromised keys or unauthorized access. |
|
Suspicious API Calls (Bar chart) New API Keys Created (Table) |
||
| Admin Activity & Configuration Drift | Admin Changes (Bar chart) | Monitors high-privilege admin activity, ensuring that security settings remain intact and highlighting any configuration drifts that could weaken the security posture. |
|
Configuration Changes (Table) Security Setting Deviations (Heatmap) |
||
| Recording & Webinar Monitoring | Recorded Meetings (Line chart) | Focuses on meeting recordings and webinars, identifying when sensitive meetings are recorded or shared externally, which may pose risks to data confidentiality. |
|
Webinar Participation (Bar chart) External Sharing of Recordings (Pie chart) |
||
| Incident Response Summary | Active Incidents (List/Table) | Provides an overview of all security incidents related to Zoom, tracking their resolution and highlighting any trends in incident generation. This is crucial for incident response planning. |
|
Incident Status (Bar chart) Incident Trends (Line chart) |
||
| Unusual Meeting Time Activity | After-Hours Meetings (Bar chart) | Highlights meetings that occur outside of normal business hours or have suspiciously long durations, which could be indicators of unauthorized activities. |
|
Weekend Meeting Activity (Line chart) Meeting Duration Anomalies (Table) |
||
| External Participant & Access Monitoring | External Participants in Sensitive Meetings (Table) | Tracks the presence of external participants in sensitive meetings and identifies any unfamiliar domains attempting to access meetings. Helps prevent external eavesdropping. |
|
External Meeting Joins (Bar chart) Unrecognized External Domains (Pie chart) |

































