A First Look at Zoombombing

Chen Ling 1
Utkucan Balci 2
Jeremy Blackburn 2
Gianluca Stringhini 1
Publication typeProceedings Article
Publication date2021-05-01
Abstract
Online meeting tools like Zoom and Google Meet have become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing has emerged, in which aggressors join online meetings with the goal of disrupting them and harassing their participants. In this paper, we conduct the first data-driven analysis of calls for zoombombing attacks on social media. We identify ten popular online meeting tools and extract posts containing meeting invitations to these platforms on a mainstream social network, Twitter, and on a fringe community known for organizing coordinated attacks against online users, 4chan. We then perform manual annotation to identify posts that are calling for zoombombing attacks, and apply thematic analysis to develop a codebook to better characterize the discussion surrounding calls for zoombombing. During the first seven months of 2020, we identify over 200 calls for zoombombing between Twitter and 4chan, and analyze these calls both quantitatively and qualitatively. Our findings indicate that the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings, particularly students in high school and college classes. This has important security implications because it makes common protections against zoombombing, e.g., password protection, ineffective. We also find instances of insiders instructing attackers to adopt the names of legitimate participants in the class to avoid detection, making countermeasures like setting up a waiting room and vetting participants less effective. Based on these observations, we argue that the only effective defense against zoombombing is creating unique join links for each participant.
Found 
Found 

Top-30

Journals

1
2
Proceedings of the ACM on Human-Computer Interaction
2 publications, 6.45%
Lecture Notes in Computer Science
2 publications, 6.45%
Computer Communication Review
1 publication, 3.23%
Journal of Medical Internet Research
1 publication, 3.23%
Journal of Research in Innovative Teaching & Learning
1 publication, 3.23%
Victims and Offenders
1 publication, 3.23%
Journal of China Computer-Assisted Language Learning
1 publication, 3.23%
Journal of the American Planning Association
1 publication, 3.23%
Behaviour and Information Technology
1 publication, 3.23%
IEEE Security and Privacy
1 publication, 3.23%
EDPACS
1 publication, 3.23%
Frontiers in Computer Science
1 publication, 3.23%
Education and Information Technologies
1 publication, 3.23%
IEEE Transactions on Computational Social Systems
1 publication, 3.23%
Annales des Telecommunications/Annals of Telecommunications
1 publication, 3.23%
4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering
1 publication, 3.23%
British Journal of Sociology
1 publication, 3.23%
1
2

Publishers

2
4
6
8
10
Association for Computing Machinery (ACM)
10 publications, 32.26%
Institute of Electrical and Electronics Engineers (IEEE)
7 publications, 22.58%
Springer Nature
5 publications, 16.13%
Taylor & Francis
4 publications, 12.9%
JMIR Publications
1 publication, 3.23%
Emerald
1 publication, 3.23%
Walter de Gruyter
1 publication, 3.23%
Frontiers Media S.A.
1 publication, 3.23%
Wiley
1 publication, 3.23%
2
4
6
8
10
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
31
Share