Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»Zooming Out: WebinarTV’s Rampant Scraping of Online Meetings
    Alerts

    Zooming Out: WebinarTV’s Rampant Scraping of Online Meetings

    adminBy adminApril 3, 2026No Comments10 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Zooming Out: WebinarTV’s Rampant Scraping of Online Meetings

    This report is distributed as TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard copyright rules.

    Disclaimer | CyberAlberta

    Summary

    CyberAlberta recently discovered that a webinar hosting platform known as WebinarTV is actively scraping and redistributing both public and private Zoom webinars without knowledge or consent of organizers. Initial access is typically gained through third-party browser extensions such as AI-powered transcription or auto-join tools. These extensions are inadvertently provided calendar permissions by their users and, in some cases, users are willfully submitting meeting details to the WebinarTV platform without the knowledge or consent of the organizers.

    While WebinarTV’s CEO claims to be compliant with copyright law and offers a takedown process, multiple users have reported unauthorized content uploads and ineffective removal procedures. The platform’s business model and associated infrastructure suggest a deliberate and scalable operation that poses ongoing privacy, reputational, and legal risks. Webinar organizers are strongly encouraged to audit their meeting configurations, restrict access to third-party tools, and take steps to safeguard against users intentionally leveraging WebinarTV.

    Details

    In late August, a Government of Alberta (GoA) ministry discovered that a recent webinar had been uploaded to WebinarTV, an online video-sharing platform that markets itself as “Organizing the world’s webinars”, without the ministry’s knowledge. Although the ministry had intended to eventually share the webinar with stakeholders, the unauthorized posting raised concerns about privacy and the risk of similar incidents affecting more sensitive meetings. The organizers were unable to determine with confidence how the recording appeared online. However, this incident coincides with numerous open-source reports of nearly identical events involving WebinarTV, providing insight into common characteristics of this activity and potential causes behind the unauthorized redistribution of webinars.

    There have been many reports on social media12 as well as online review boards3 indicating hidden scraping of not just publicly advertised webinars, but supposedly private meetings as well. Many organizers reported first learning that their webinars had been made publicly available through a notification email from WebinarTV themselves. The boiler plate email, sent by “Sarah Blair, VP of Communications, WebinarTV[.]us”4 informs recipients that their webinar was now accessible on the platform, and broken down into “chapters.” A sample of this email template, as shared by a Reddit user, is shown below (Figure 1). Some affected organizers also retroactively identified unfamiliar registrants who had joined their session using anomalous email domains, such as @bestwest[.]space, which has been observed in at least two separate incidents.

    Boiler plate email from Sarah Blair at WebinarTV

    Figure 1 – Boiler plate email from Sarah Blair at WebinarTV, notifying the recipient that their webinar is now publicly available on their platform. Source: Reddit. 5

    WebinarTV appears to operate a business model centered around a promotional service called “Lead Advantage”, which it offers for a fee. The platform scrapes webinars en masse and positions itself as a facilitator to help these webinars reach a broader audience, which in the case of private webinars is the opposite intention.  

    According to WebinarTV’s FAQs, Lead Advantage enables “hosts” (a term it uses to refer to individuals whose content has been scraped) to “promote their webinars through web placements, email distribution, and higher prominence directory listings”. The service encourages these hosts to bid for increased exposure, with bidding starting at USD $20.  

    WebinarTV's Catalog

    Figure 2 – WebinarTV’s Catalog. Source: WebinarTV[.]us

    WebinarTV claims that higher bids “ensure better visibility and access to a more engaged audience,” effectively turning scraped meetings into the underlying product of an auction system. This model incentivizes content owners to pay for visibility of their own material, under the guise of promotional outreach.

    Initial Access and Persistence

    CyberAlberta’s investigation found that WebinarTV primarily gains initial access to Zoom webinars via third-party browser extensions. These extensions can access webinar links when a user either inadvertently grants calendar permissions—exposing meeting invitations—or willfully submits meeting details into the WebinarTV platform.

    WebinarTV is believed to leverage a range of browser extensions that provide functionalities such as AI powered transcription and note-taking tools, or tools to automate the joining of online meetings. The platform mostly relies on the widespread use of these tools by end users, rather than operating them directly. However, at least one of the known extensions is listed on the Chrome Web Store as developed by WebinarTV.  

    Known extensions associated with this activity include, but are not limited to:

    • GoTo Webinar & Meeting Download Recordings (published by meetingtv[.]us)
    • Auto Join for Google Meet
    • Meet Auto Admit
    • OtterAI
    • NottaAI

    While most of these tools are not directly affiliated with WebinarTV, they serve as common vectors for the potential exposure of private webinar content. This finding is supported by information provided to CyberAlberta by Zoom, as well as recurring reports from webinar organizers who observed unauthorized use of AI-powered transcription and note-taking tools in their affected sessions.67

    Collection

    Once these tools join a meeting—either with or on behalf of a user—the session content is captured and subsequently published on WebinarTV.us. By analysing previews of uploaded webinars, CyberAlberta validated claims made by online users8 that WebinarTV uses screen capture to scrape content, rather than using Zoom’s built-in “Record” function. The available previews display screenshots consistent with a screen-captured view, rather than the format produced by a native Zoom recording (Figure 3).

    Preview of a scraped webinar

    Figure 3 – Preview of a scraped webinar (with speaker and content redacted) which shows the use of screen capture.

    Impact

    Whether WebinarTV obtained access through publicly advertised links or inadvertently compromised private sessions via a third-party browser extension, the privacy and security implications remain significant. As many users have noted, the uploaded webinars often expose the names and contact details of attendees, and in some cases, sessions were designated as private due to sensitive organizational discussions, raising concerns about loss of confidentiality and reputational damage.

    Ethics and Legality

    WebinarTV’s CEO, Michael Robertson, has repeatedly defended the platform in posts on LinkedIn9, Reddit1011, and Trustpilot (giving their own service multiple five-star reviews) 12, claiming the platform only catalogs free and public webinars, complies with DMCA regulations, and offers a removal process. However, many users allege that takedown requests are ignored or delayed and repeatedly argue that content is being harvested without permission, often appearing confused as to how WebinarTV gained access to a webinar the organizers believed to be private.

    LinkedIn profile for WebinarTV CEO Michael Robertson

    Figure 4 – LinkedIn profile for WebinarTV CEO Michael Robertson. Source: LinkedIn

    The LinkedIn profile for Michael Robertson (Figure 4) was created in June 2008. This early creation date suggests the account is not a recently fabricated persona intended to lend credibility to WebinarTV. Instead, it indicates this profile, and associated Reddit13 and Trustpilot14 accounts, likely belong to the same Michael Robertson who previously served as CEO of the now-defunct online music library MP3Tunes, which was found liable for copyright infringement and ordered to pay USD $41 million in 201415.

    In a 2014 court ruling, Michael Robertson was found liable for copyright infringement

    Figure 5 – In a 2014 court ruling, Michael Robertson was found liable for copyright infringement. Source: Billboard

    The legality of WebinarTV’s practices likely varies by jurisdiction, with cases in the United States (US) hinging on the Digital Millennium Copyright Act (DMCA) “safe harbor” provision16, while recordings of meetings in Canada is likely protected by the “one-party consent” rule17.

    Connected Infrastructure

    WebinarTV has two known domains associated with publicly hosting scraped webinars (webinartv[.]us and meetingtv[.]us), both of which were registered using Namecheap and hosted on Google IP space (AS 15169). Pivoting on these characteristics identified 29 further domain names, all sharing an apex domain of either “webinartv”, “meetingtv” or “topwebinar”, using many different top-level domains (TLDs) i.e., “.shop”, “.xyz”, “.org”, “.biz” etc., and all hosted on the same Google subnet (216.239.32.0/19). All connected infrastructure is listed below in the Indicators of Compromise (IOCs).

    Assessment

    CyberAlberta assess that WebinarTV will almost certainly continue scraping Zoom webinars made accessible through third-party browser extensions, capturing content and repurposing it on its platform as part of its monetization strategy. Given the ethical and privacy concerns, organizations are advised to review and secure online meeting configurations to reduce the risk of webinar scraping. Recommendations and detection opportunities are provided below to support improved webinar security and privacy posture.

    Recommendations

    The following recommendations are provided to mitigate possible points of initial access for webinar scrapers to Zoom meetings.

    • Configure Zoom authentication settings to allow only authenticated users or restrict access to users with email addresses from approved domains.18
    • Require advance registration to attend meetings, allowing hosts to pre-approve attendees and prevent unauthorized access.19
    • Block domains associated with AI transcription and note-taking tools from joining Zoom meetings.20
    • Once the session has started and all required attendees are present, lock the meeting21 to prevent any new unwanted attendees in the form of bot accounts from third-party browser extensions.
    • Require passcodes for all attendees to gain entry to the meeting.22
    • If any unwanted AI transcription or note taking tools have been discovered in the meeting, use the “Manage Participants” options to remove them23
    • If a webinar’s privacy is believed to have been violated, formal complaints can be submitted the Office of the Privacy Commissioner of Canada (OPC)24 or to Alberta’s Office of the Information and Privacy Commissioner (OIPC).25
    • Consider implementing blocks on the extension IDs of any third-party browser extensions identified as potentially unwanted. A list of the referenced extensions is provided in the Detection Opportunities section below (Figure 6).  
    • In Microsoft environments, extension ID blocking can be configured via Intune. 26
    • The Canadian Centre for Cyber Security (CCCS) has released guidance for securing multiple video-teleconferencing (VTC) platforms such as Slack and Microsoft Teams to safeguard against similar threats to privacy.27

    Detection Opportunities

    To view extension usage in Microsoft Defender, go to the Endpoints > Vulnerability management > Inventories menu, then select the ‘Browser extensions’ tab. This view provides details about each extension in the environment such as extension ID, what devices they’re installed on, which users are using them, and crucially, what permissions have been granted.

    Alternatively, the following KQL queries can assist with detecting the use of potentially unwanted third-party browser extensions.

    // Identify browser extensions running in the environment

     

    DeviceTvmBrowserExtensions

    | where ExtensionId != ” ” // and IsActivated == “true”  

     

    // Detect the use of specific potentially unwanted third-party browser extensions

    let ExtensionIDs = dynamic([‘cphibdhgbdoekmkkcbbaoogedpfibeme’,

                              ‘ajfokipknlmjhcioemgnofkpmdnbaldi’,

                              ‘ceofheakaalaecnecdkdanhejojkpeai’,

                              ‘bnmojkbbkkonlmlfgejehefjldooiedp’,

                              ‘kdelkaogljjcbjffjmahedaobfjineig’,

                              ‘meimoidfecamngeoanhnpdjjdcefoldn’]);

    DeviceTvmBrowserExtensions

    | where ExtensionId in (ExtensionIDs) // and IsActivated == “true”

     

    Third-Party Browser Extension Extension ID
    GoToWebinar & GoToMeeting Download Recordings cphibdhgbdoekmkkcbbaoogedpfibeme
    Auto-join for Google Meet ajfokipknlmjhcioemgnofkpmdnbaldi
    Meet auto admit ceofheakaalaecnecdkdanhejojkpeai
    Otter.ai: Record & Transcribe Meetings – Google Meet & Web Audio bnmojkbbkkonlmlfgejehefjldooiedp
    Notta: AI Meeting Notetaker & Audio Transcription kdelkaogljjcbjffjmahedaobfjineig
    Fireflies: AI meeting notes meimoidfecamngeoanhnpdjjdcefoldn

    Figure 6 – Extension IDs of potentially unwanted third-part browser extensions.

    Indicators of Compromise (IOCs)

    The following IOCs characterize WebinarTV activity described in this report.

    Description Indicator
    Known domains for WebinarTV webinartv[.]us
    meetingtv[.]us

    Domains identified using similar name, hosted on same subnet, and registered using Namecheap

    meetingtv[.]cc
    meetingtv[.]in
    meetingtv[.]link
    meetingtv[.]online
    meetingtv[.]org
    meetingtv[.]top
    meetingtv[.]xyz
    topwebinars[.]us
    webinartv[.]biz
    webinartv[.]cam
    webinartv[.]cc
    webinartv[.]cloud
    webinartv[.]club
    webinartv[.]co
    webinartv[.]digital
    webinartv[.]guru
    webinartv[.]info
    webinartv[.]ink
    webinartv[.]me
    webinartv[.]net
    webinartv[.]online
    webinartv[.]pics
    webinartv[.]quest
    webinartv[.]rocks
    webinartv[.]shop
    webinartv[.]today
    webinartv[.]top
    webinartv[.]wiki
    webinartv[.]xyz
    IP Addresses (not recommended for blocking due to shared hosting) 216.239.32[.]21
    216.239.34[.]21
    216.239.36[.]21
    216.239.38[.]21

    Table 1 – WebinarTV Indicators of Compromise

     

    MITRE ATT&CK

    The following table maps tactics, techniques, and procedures (TTPs) described in this report to the MITRE ATT&CK Framework.

    Tactic Technique Observable
    Initial Access T1199: Trusted Relationship WebinarTV potentially registers for publicly advertised webinars or leverages a browser extension present on a legitimate attendee’s browser.
    Persistence T1176.001: Software Extensions: Browser Extensions WebinarTV potentially maintains access through a browser extension, providing the ability to infiltrate all webinar’s attended by those who use the browser extension in question.
    Collection T1113: Screen Capture WebinarTV collects video and audio of webinars through desktop screen capture.

    Table 2 – WebinarTV TTPs 



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-364175 V1.7 (Last Update: 2026-01-13): Multiple Vulnerabilities in Palo Alto Networks Virtual NGFW on RUGGEDCOM APE1808 Devices Before V11.1.4-h1
    Next Article Siemens SICAM 8 Products | CISA
    admin
    • Website

    Related Posts

    Alerts

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026
    Alerts

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026
    Alerts

    Yearly Breach Reports Summary 2023

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026

    GitLab security advisory (AV26-327) – Canadian Centre for Cyber Security

    April 8, 2026

    Heap-based buffer overflow in cw_acd daemon

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.