Cythera Cyber Security

Data Harvester Parading as a Legitimate Application -ZoomInfoContactContributor.exe

Cythera are reporting a significant increase in the installation of a potentially unwanted application called ZoomInfo Contact Contributor. ZoomInfo’s “free” utility to provide users with contact details where access is paid for in a user’s data.
Talk to an expert

What is Happening?

Cythera are reporting a significant increase in the installation of a potentially unwanted application called ZoomInfo Contact Contributor. ZoomInfo’s “free” utility to provide users with contact details where access is paid for in a user’s data and not in money. Their application scrapes a large amount with ZoomInfo’s Privacy Policy stating the following:

Information that may be collected from the user’s email client includes the following, if available:

  • Name
  • Email address
  • Job title and department
  • Phone numbers (general or direct business numbers, faxes and/or mobile numbers)
  • Company name
  • Postal address of company
  • Business related postal address of person
  • Corporate website URLs
  • Social media URLs
  • Metadata such as Internet Protocol addresses, the dates email messages are sent or received, and subject line information
  • Email addresses, names, and job titles of recipients and senders

This is not entirely transparent on the part of ZoomInfo. Risk assessments performed by sandboxing tools, indicates further information that ZoomInfo attempts to extract via their application. This includes Microsoft Edge browser history, email credentials and system information. On their website, ZoomInfo claim “we do not track personal browsing history”. ZoomInfo claims to only scrape email headers and signature blocks that are received by community members in addition to claiming that bots analyse that information.

ZoomInfo claim that user’s can “opt out” of their service and have their profile removed from the database. One of Cythera’s SOC Analysts has initiated this process on their own profile and is pending a response from ZoomInfo.

To be clear, there are legitimate use cases for other products in ZoomInfo’s lineup. This blog is to specifically address the “free” Community Edition.

What you can do

Implement application level blocks via Endpoint Management tools like Intune and Desktop Central to prevent the application from being installed. Cythera recommend blocking the following:

  • coordinator.exe (SHA256: a094d96e2c4d3ffa26c0b74ddde1448f0acc7f9cdaa7c15cd76d948f3f163a70)
  • ZoomInfoContactContributor.exe (Installer) (SHA256: 2aa9f15810e2c55dbc8522e386d76d1a8fb3a63a712b33e17bd2139a7b45c76b)

Implement blocks at the network level to prevent the application attempting to install in the first place. Cythera recommends outbound blocks to the following domains:

  • zoominfo[.]com
  • cswapper.appspot[.]com
  • cswapper.freshcontacts[.]com

Additionally, Cythera are actively hunting for the suspicious indicators associated with ZoomInfo for our customers and we are developing detection rules for our Managed Detection and Response customers.

If you have any questions or concerns, please feel free to reach out to us.

Resources


Events

Latest events

Join Cythera experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
No items found.
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Host Header Injection
Silverstripe CMS is affected by a Host Header Injection flaw, which can be exploited to manipulate password reset workflows, potentially redirecting or compromising user data.
FarCry Core Framework - Multiple Issues
FarCry Core contains multiple vulnerabilities that could let unauthenticated users upload arbitrary files and execute remote code on the hosting server.
Silverstripe – Cross-Site Scripting (XSS) Vulnerability
With local organisation admin credentials, an attacker can exploit the API to create, delete, or revert virtual machine snapshots in other organisations’ Virtual Data Centres (VDCs), breaching isolation boundaries.