Skip to main content

Think your Zoom meeting is safe from Zoombombing? Think again…

online meeting
(Image credit: aslysun / Shutterstock)

The rise of Zoom during the Covid-19 pandemic has been incredibly impressive, with many of us now using the tool to host meetings with colleagues, take online classes or keep in touch with friends and loved ones. But this has also made the service a target for malicious users, who gate-crash meetings and harass the participants.

Known as ‘Zoombombing’, these disruptions have ranged from annoying to downright offensive and scary, and a new report, titled A First Look at Zoombombing, has found that many of the most popular ways of protecting our Zoom meetings – as well as video calls on other services – are simply not effective.

While individuals and organisations have tried to protect their meetings using passwords, not giving out links publicly, or even announcing their meetings outside of their employees, the report suggests that these aren’t always effective due to one incorrect assumption: that the malicious ‘zoombombers’ are outside attacks from users who have hacked into a random meeting.

Rather worryingly, the report suggests that “the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings.”

Inside jobs?

The paper was written by researchers from Boston University and the State University of New York at Binghamton, who studied evidence of zoombombing calls, along with posts on sites such as Twitter and 4chan.

It found that users with legitimate invites to these meetings were either sharing the information with other people, or performing the zoombombing themselves, and that this was particularly affecting zoom meetings and classes in high schools and colleges.

The paper identifies three main security countermeasures that people and organisations put in pace to protect their online meetings, which are password protecting the meetings, avoiding public announcements of the meetings on social media, and using the Waiting Room feature of Zoom to admit people to the meeting.

As the researchers found, these measures may offer protection against random attacks, but are pretty much useless if the zoombombing is orchestrated by someone with a legitimate invite.

It means passwords are shared, as well as details about the meetings. Names of other legitimate invitees can also be shared, which allows malicious users to sign in under a different name, which means the Waiting Room feature becomes less effective.

Also, the larger the Zoom meeting, the harder it is to vet every participant.

Zoom

(Image credit: Shutterstock)

So, what can be done? The researchers suggest that the most effective protection is by creating personalized meeting links. “This way, as long as the insider joins the meeting, unauthorized people will not be able to join using the same link.”

While this could help, at the moment only Zoom and Webex allow personalized meeting links. The researchers are encouraging other services to adopt these features.

As Arstechnica reports, Zoom provided a comment, saying that “Zoom offers unique link capabilities when meeting registration is turned on. We have also recently updated a number of default settings and added features to help hosts more easily access in-meeting security controls, including controlling screen sharing, removing and reporting participants, and locking meetings, among other actions.”

The company is also working with users to educate them in securing their meetings, and is encouraging anyone who experiences a zoombombing to report the incidents to Zoom and law enforcement.

Matt Hanson

Senior Computing editor

Matt (Twitter) is TechRadar's Senior Computing editor. Having written for a number of magazines and websites, there's no aspect of technology that Matt isn't passionate about, especially computing and PC gaming. If you're encountering a problem or need some advice with your PC or Mac, drop him a line on Twitter.