Zoombombing is a type of cyber-harassment in which an individual or a group of unwanted and uninvited users interrupt online meetings over the Zoom video conference app. This disruption occurs when intruders gate-crash gatherings -- sometimes for malicious purposes, such as sharing pornographic or hate images or shouting offensive language -- without the host's permission.
The Zoom cloud platform offers video and audio conferencing, collaboration, chat and webinars via mobile devices, desktops, telephones and room systems and is the signature offering from Zoom Video Communications Inc., a publicly traded company founded in 2011. Recognizable by its grid view that lets people see everyone on a call at once, Zoom became popular because of its ease of use and installation, as well as its freemium pricing model. With the COVID-19 virus outbreak in early 2020, demand for the Zoom video conferencing app surged to unprecedented levels as business meetings, classes and even family gatherings shifted online and users sought ways to stay in touch virtually while social distancing. As the number of Zoom meetings increased, reports of Zoombombing followed.Content Continues Below
How Zoombombing works
In a March 2020 warning about Zoombombing, the FBI advised individuals transitioning to online meetings and classes to practice "due diligence and caution in [their] cybersecurity efforts." The FBI recommended keeping video conferences private and avoiding openly posting links to the conferences on social media platforms, like Twitter or Facebook. The link should be provided directly to specific people only.
Conferences are vulnerable to Zoombombing when they are hosted on public channels shared over the internet through URLs, making them easily accessible to unwanted trolling. Hijackers can sometimes figure out the correct URL or meeting ID for a public Zoom session and gain access to the meeting. A basic Google search for URLs containing "Zoom.us" can unearth unprotected links of meetings; plus, links to public meetings may be available on organizational pages on social media.
In addition, if Zoom screen-sharing privileges are not set to "host only," uninvited guests can share disturbing images or potentially malware. Also, a remote control feature lets users take control of another participant's screen in a meeting. A user can either ask for remote control of another participant's screen, or the other participant can grant control to a user.
How to prevent Zoombombing
To avoid interruptions from Zoombombers, meeting attendees must use a passcode and not their Personal Meeting ID, which would enable someone with their unique 10-digit number to join the meeting. An additional protective feature is Waiting Room, where the host must admit attendees. To activate Waiting Room, sign in to the Zoom web portal, click Meetings and select a meeting topic or schedule a new meeting. Select Enable Waiting Room under Meeting Options.
Zoom has encouraged those hosting large, public group meetings to adjust their settings so that only they can share their screen. To ensure that only the host can share the screen, tap the Share Screen button, and select Advanced Sharing Options.
After the meeting has begun and all attendees are present, the room can be locked. Using the More menu to mute all participants as they enter and not allowing participants to unmute themselves can also help prevent disruptions. The host can remove participants by hovering over their names.
If a Zoom meeting is hijacked, users can let the company know. In a software update, the company added a report a user to Zoom button. This feature can produce a report to be "sent to the Zoom Trust and Safety team to evaluate any misuse of the platform and block a user if necessary," according to the company.
Zoom security updates
To help boost privacy and security, users should employ the latest version of the remote access/meeting applications, the FBI recommended. In a January 2020 Zoom update, the company added password protection by default for meetings and disabled the ability to randomly scan for meetings to join. In late April 2020, Zoom further tightened security with the release of new encryption and privacy controls to help prevent the hijacking of online meetings. The new version of the video conferencing platform will enable hosts to report a user to Zoom with a new security button. Additionally, the app now sends users by default to a waiting room, and they must have approval to enter a meeting. A password will be required to enter all meetings.
Furthermore, a new encryption standard, Advanced Encryption Standard (AES) 256-bit Galois/Counter Mode (GCM) encryption, was added to the application. This end-to-end encryption (E2EE) adds a layer of privacy by eliminating the likelihood of video conferences being hijacked.
In addition to Zoombombing, the app was criticized for other vulnerabilities, including one in which a hacker could take control of a user's computer. Seeking to address security issues, Zoom has enhanced its bug bounty program to encourage security professionals to alert it to potential bugs.
Zoom's success at addressing security and privacy issues will have a major impact on the application's success in the long run. Another challenge Zoom faces is growing competition from Facebook, Google and Microsoft, as well as Cisco Webex, LogMeIn, GoToMeeting, BlueJeans and Arkadin Cloud Communications.