A First Look at Zoombombing

09/08/2020
by   Chen Ling, et al.
0

Online meeting tools like Zoom and Google Meet have become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing has emerged, in which aggressors join online meetings with the goal of disrupting them and harassing their participants. In this paper, we conduct the first data-driven analysis of calls for zoombombing attacks on social media. We identify ten popular online meeting tools and extract posts containing meeting invitations to these platforms on a mainstream social network, Twitter, and on a fringe community known for organizing coordinated attacks against online users, 4chan. We then perform manual annotation to identify posts that are calling for zoombombing attacks, and apply thematic analysis to develop a codebook to better characterize the discussion surrounding calls for zoombombing. During the first seven months of 2020, we identify over 200 calls for zoombombing between Twitter and 4chan, and analyze these calls both quantitatively and qualitatively. Our findings indicate that the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings, particularly students in high school and college classes. This has important security implications, because it makes common protections against zoombombing, such as password protection, ineffective. We also find instances of insiders instructing attackers to adopt the names of legitimate participants in the class to avoid detection, making countermeasures like setting up a waiting room and vetting participants less effective. Based on these observations, we argue that the only effective defense against zoombombing is creating unique join links for each participant.

READ FULL TEXT

page 1

page 12

page 13

research
02/21/2023

Sedition Hunters: A Quantitative Study of the Crowdsourced Investigation into the 2021 U.S. Capitol Attack

Social media platforms have enabled extremists to organize violent event...
research
09/24/2020

Understanding the Use of Fauxtography on Social Media

Despite the influence that image-based communication has on online disco...
research
01/10/2022

Social Media Networks Attacks and their Preventive Mechanisms: A Review

We live in a virtual world where actual lifestyles are replicated. The g...
research
10/07/2021

Evolutionary Computation-Assisted Brainwriting for Large-Scale Online Ideation

Brainstorming is an effective technique for offline ideation although th...
research
04/16/2018

The Effect of Extremist Violence on Hateful Speech Online

User-generated content online is shaped by many factors, including endog...
research
05/28/2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Over-sharing poorly-worded thoughts and personal information is prevalen...
research
05/28/2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

Abusers increasingly use spyware apps, account compromise, and social en...

Please sign up or login with your details

Forgot password? Click here to reset