The UK Cabinet is meeting on Zoom… here’s the meeting ID

Cabinet zoom

UK Prime Minister Boris Johnson announced on Twitter this afternoon that he was chairing the first ever digital Cabinet, while he self-isolated himself at Downing Street after revealing he was suffering “mild symptoms” of Coronavirus.

Boris Johnson tweet

Johnson included in the tweet a screenshot of his desktop, showing there were 35 participants on the Zoom meeting.

Sign up to our free newsletter.
Security news, advice, and tips.

But the screenshot also revealed some details it probably wasn’t so wise to share.

Because a close examination of the screenshot reveals the meeting ID of the Zoom call.

Zoom meeting close up
Boris Johnson’s Zoom meeting. Click for larger version

Good news for anyone who was hoping to join the meeting but had mislaid the Zoom meeting ID.

But bad news for any mischief makers hoping to take advantage – the Zoom meeting is password-protected. Thank heavens for that.

Let’s hope it’s a strong password, that’s hard to guess.

h/t @newschambers

Found this article interesting? Follow Graham Cluley on Twitter, Mastodon, or Threads to read more of the exclusive content we post.

Graham Cluley is a veteran of the cybersecurity industry, having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent analyst, he regularly makes media appearances and is an international public speaker on the topic of cybersecurity, hackers, and online privacy. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

5 comments on “The UK Cabinet is meeting on Zoom… here’s the meeting ID”

  1. Prime Menacer
  2. Phil

    Well, it had ended. So what’s the harm. Nothing. Just a click bait headline

    1. John Harker · in reply to Phil

      Phil – You've missed the point my a New York mile! The harm is that broader awareness is needed around proper security measures when using conferencing platforms. Individuals have been guessing URLs, spying on sensitive meetings, and using common passwords to jump onto calls.

  3. Yallaen

    Agree! Not to mention several zero-day vulns exist for the MacOS client for Zoom. Zoom has had several critical vulns in the past for Windows clients. I'm wondering how many companies are learning that Zoom is being used on their network without authorization?

  4. Bobs Yeruncle

    The Press Team HQ seem to have got the security message and hidden in the cupboard!
    Probably safer than the limited social distancing around the Cabinet Room.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.