OLIVIER DOULIERY/AFP via Getty Images
Last year wasnt exactly short of threats facing humanity, but Zoombombing was an especially 2020 kind of disruption, one that sought to hijack one of the most prominent means of communication by which people stayed in touch with everyone from co-workers to friends and family during lockdown.
Zoombombing, for those unfamiliar with it, works like this: An unwanted participant or participants access a Zoom call without being invited, against the wishes of the participants, and cause problems. One Massachusetts-based high schools Zoom session was hijacked by an individual who screamed profanities and then shouted the teachers home address. On social media, some users reported that their Zoom session had been taken over and used to show pornographic content.
Zoom, whose usage exploded during the pandemic, was suddenly at the center of what appeared to be a glaring vulnerability problem: It was as if the leading manufacturer of front door locks revealed a high failure rate during a home invasion epidemic.
But researchers from Binghamton University in New York say theres more to this story than meets the eye. According to a worlds-first study they have carried out, the majority of Zoombombing incidents are actually inside jobs. To draw an analogy with creepy campfire stories about terrified babysitters: The calls are coming from inside the house. Well, kind of.
There were a lot of people that thought that maybe this was some kind of clever hacking, or else [the result of attackers] finding people that would accidentally post Zoom links on social media or sending out email blasts, Jeremy Blackburn, an assistant professor of computer science at Binghamton University, told Digital Trends. [People figured it was] these outsiders who were randomly showing up, somehow finding a link to a meeting. It was an act of attack that the Zoombombers were perpetuating, just by themselves.
Blackburns major research interest, his university website profile notes, involves understanding jerks on the internet, from toxic behavior and hate speech to fringe and extremist web communities. He was intrigued by the rise of Zoombombing as a phenomenon, but also not entirely convinced by the theories.
How were they getting in? They could be brute-forcing the call IDs, but given the size of the search space, it seemed unlikely that they would be able to consistently find active calls to target. And while human error was certainly possible, in terms of people leaving Zoom links lying around, this also seemed improbable.
To quote Sherlock Holmes popular aphorism: When you have eliminated the impossible, whatever remains, must be the truth. Or, in this case, if people arent breaking into Zoom calls on their own, someone on the call must be willfully letting them in.
As it turns out, what we found is that Zoombombings were perpetuated by people that were legitimately in the call, Blackburn said. What would happen is that [a member of the call] would go ahead and share the meeting link on some fringe websites and say, Hey guys, show up and, you know, say the N-word or whatever in the call. Pretty much every time, it was a student asking people to come [and] Zoombomb lectures. They would also do things like say, Hey, use this name when you connect, because thats the name of somebody else in the class.'
To reach this conclusion, the researchers scoured tens of millions of social media posts, uncovering more than 200 calls for Zoombombing between Twitter and 4chan during the first seven months of 2020 alone. Between January and July that year, they identified 12,000 tweets and 434 4chan threads that discussed online meeting rooms, then used thematic qualitative analysis to identify the posts calling for Zoombombing. As Blackburn noted, the majority of the calls for Zoombombing in their dataset targeted online lectures, with evidence of both universities and high schools being the most heavily targeted groups.
In addition to Zoom, they also found evidence of similar bombing attacks on other popular communication platforms including Hangouts, Google Meet, Skype, Jitsi, GoToMeeting, Microsoft Teams, Cisco Webex, BlueJeans, and StarLeaf.
[For a company like Zoom], unless they perform the type of investigation we did, on their end it seems really difficult to detect this type of thing, Blackburn said. Because its not really a technical vulnerability. Its kind of a sociotechnical vulnerability If they were just looking at traffic [or whatever other] metrics they have, Im not sure it would be possible to purely detect this. You would need a study like ours that goes out and specifically tries to understand how this sociotechnical problem is unfolding.
(Digital Trends reached out to Zoom for comment, and we will update this story when we hear back.)
The results pose a challenge for communication platforms like Zoom. Their ease of use makes them appealing. Just click a link and youre suddenly talking to your friends or joining the morning huddle at work. But this also necessitates lowering security measures that could eradicate this behavior.
Anything involving security is always kind of a trade-off between ease of use and the robustness of the security, Blackburn said. I dont think people [would want to] go through a whole process of registering individual users and creating one-time links [in a more time-intensive manner]. Its much easier, and much more straightforward for non-tech-savvy people, to just have a link, click it, and it opens the program. That is certainly a big reason that Zoom gained the type of adoption it did. If it would have had a much more complicated, but secure, registration system, I would imagine something else would have [become] the dominant application.
Zoom does offer passwords as a login option. However, given the complicity of users, they would seem unlikely have to blocked Zoombombers with the right advanced knowledge. The same is true for waiting rooms, in which the host must manually approve people for entrance. While this would seem to be a more secure option, they are insufficient if the Zoombombers name themselves after people in a class in order to confuse the teacher or lecturer. (Thanks to a recent update, hosts can, however, pause their meetings to manually remove troublesome participants.)
Blackburn describes Zoombombing behavior as raiding, and says that it has always been a part of online life. Now, its using Zoom, but if you go back even to the IRC days (read: Internet Relay Chat, an early text-based chat protocol created in 1988), there were [online] wars where people would try and take over different channels, he said. Any time you have computer-mediated communication on the web [thats] instant and semi-anonymous, youre going to have people that get into conflict and attempt to disrupt things. In that sense, its not new, its the same basic sociotechnical problem with the internet. If theres an available mechanism to cause trouble, somebodys going to cause trouble.
In addition to Blackburn, other researchers on the project include Chen Ling, Utkucan Balc, and Gianluca Stringhini. A paper describing the work, titled A First Look at Zoombombing, is available to read online.
Link:
Inside job: Why Zoombombing isnt as random as you might think - Digital Trends
- Jitsi - Business VoIP Phone Service | OnSIP [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Softonic - Jitsi - Download [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- The Architecture of Open Source Applications: Jitsi [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Jitsi - Wikipedia, the free encyclopedia [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- Jitsi - Official Site [Last Updated On: April 26th, 2014] [Originally Added On: April 26th, 2014]
- FLOSS Weekly 293: Jitsi Meet - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- Jitsi Overview: FLOSS Weekly 293 - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- NetSecDemo Secure FTP over Jitsi - Video [Last Updated On: May 9th, 2014] [Originally Added On: May 9th, 2014]
- Jitsi VoIP softphone Hands On Tutorial - Video [Last Updated On: May 11th, 2014] [Originally Added On: May 11th, 2014]
- Eliyah Moore, Barum Jiu Jitsi Vs Cahel Gonzalez, 5 Star Martial Arts - Video [Last Updated On: May 16th, 2014] [Originally Added On: May 16th, 2014]
- How to download and install Jitsi - Video [Last Updated On: May 17th, 2014] [Originally Added On: May 17th, 2014]
- Jitsi (Mac) - Download - Softonic [Last Updated On: September 1st, 2014] [Originally Added On: September 1st, 2014]
- Using XMPP chat with Jitsi - Video [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- Jitsi - SIP Softphone - Video [Last Updated On: September 12th, 2014] [Originally Added On: September 12th, 2014]
- The Luminosity of Free Software Episode 20 - Video [Last Updated On: September 13th, 2014] [Originally Added On: September 13th, 2014]
- FOSDEM 2014 - Jitsi Videobridge And Webrtc - Video [Last Updated On: September 16th, 2014] [Originally Added On: September 16th, 2014]
- Just Linux touch screen and Jitsi - Video [Last Updated On: September 16th, 2014] [Originally Added On: September 16th, 2014]
- jitsi.org | Jitsi [Last Updated On: September 17th, 2014] [Originally Added On: September 17th, 2014]
- Bitcoin and dark wallet could be used by terrorists. So what? [Last Updated On: September 24th, 2014] [Originally Added On: September 24th, 2014]
- Top messaging apps flat-out flunk EFF's security review [Last Updated On: November 5th, 2014] [Originally Added On: November 5th, 2014]
- When I say join me in a jitsi meet... - Video [Last Updated On: November 7th, 2014] [Originally Added On: November 7th, 2014]
- Jitsi Flasms Dogfooding: Using your own imperfect solutions helps improve them, - Video [Last Updated On: November 10th, 2014] [Originally Added On: November 10th, 2014]
- IETF91 chairs meeting Honolulu Jitsi Meet presentation - Video [Last Updated On: November 17th, 2014] [Originally Added On: November 17th, 2014]
- IETF91 chairs meeting Honolulu Jitsi Meet questions - Video [Last Updated On: November 18th, 2014] [Originally Added On: November 18th, 2014]
- jitsi videollamada - Video [Last Updated On: December 26th, 2014] [Originally Added On: December 26th, 2014]
- Skype Encrypted Alt. SIP Jitsi Combo [Last Updated On: February 7th, 2015] [Originally Added On: February 7th, 2015]
- Jitsi Wikipdia [Last Updated On: February 7th, 2015] [Originally Added On: February 7th, 2015]
- Jitsi for Mac | MacUpdate - Apple Mac OS X Software & Apps ... [Last Updated On: February 13th, 2015] [Originally Added On: February 13th, 2015]
- Nexi Unified Communication Jitsi Presentazione full - Video [Last Updated On: February 19th, 2015] [Originally Added On: February 19th, 2015]
- Jitsi - secure IM & VoIP | security in-a-box [Last Updated On: March 21st, 2015] [Originally Added On: March 21st, 2015]
- JITSI - Video [Last Updated On: April 8th, 2015] [Originally Added On: April 8th, 2015]
- Jitsi: A Multi-Protocol, Cross Platform Compatible Chat ... [Last Updated On: July 24th, 2015] [Originally Added On: July 24th, 2015]
- jitsi/jitsi-meet GitHub [Last Updated On: July 24th, 2015] [Originally Added On: July 24th, 2015]
- Jitsi Tutorial 1 - Installation - Top Windows Tutorials [Last Updated On: August 8th, 2015] [Originally Added On: August 8th, 2015]
- Jitsi, ostel.co and ISP censorship | The Guardian Project [Last Updated On: August 30th, 2015] [Originally Added On: August 30th, 2015]
- Jitsi | Tiki Suite [Last Updated On: August 30th, 2015] [Originally Added On: August 30th, 2015]
- Jitsi SIP Softphone Review - About.com Tech [Last Updated On: August 30th, 2015] [Originally Added On: August 30th, 2015]
- Jitsi Configuration and Review - Callcentric [Last Updated On: August 30th, 2015] [Originally Added On: August 30th, 2015]
- A Skype alternative worth its salt: Jitsi | usability ... [Last Updated On: September 6th, 2015] [Originally Added On: September 6th, 2015]
- Jitsi (Build 3132) [Last Updated On: September 24th, 2015] [Originally Added On: September 24th, 2015]
- [jitsi-users] SIP - Lync Connect deosnt work [Last Updated On: December 19th, 2015] [Originally Added On: December 19th, 2015]
- Jitsi - Wikipedia, la enciclopedia libre [Last Updated On: December 22nd, 2015] [Originally Added On: December 22nd, 2015]
- Why did Atlassian Acquire Jitsi? (Hint: WebRTC Multiparty ... [Last Updated On: March 6th, 2016] [Originally Added On: March 6th, 2016]
- Jitsi Download - Softpedia [Last Updated On: March 16th, 2016] [Originally Added On: March 16th, 2016]
- OpenFire Jitsi as Skype(desktop sharing) and Temviewer ... [Last Updated On: March 20th, 2016] [Originally Added On: March 20th, 2016]
- Jitsi - WOW.com [Last Updated On: April 11th, 2016] [Originally Added On: April 11th, 2016]
- Review: Jitsi the ultimate SIP voice and video client ... [Last Updated On: April 22nd, 2016] [Originally Added On: April 22nd, 2016]
- Jitsi WOW.com | Prometheism.net [Last Updated On: May 1st, 2016] [Originally Added On: May 1st, 2016]
- Jitsi - OSTN - Guardian Project Open Dev [Last Updated On: May 21st, 2016] [Originally Added On: May 21st, 2016]
- Jitsi - FreeBSD Wiki [Last Updated On: May 22nd, 2016] [Originally Added On: May 22nd, 2016]
- Jitsi - [Last Updated On: May 24th, 2016] [Originally Added On: May 24th, 2016]
- Chocolatey Gallery | Jitsi 2.8.5426 [Last Updated On: May 28th, 2016] [Originally Added On: May 28th, 2016]
- Jitsi - Quora [Last Updated On: May 31st, 2016] [Originally Added On: May 31st, 2016]
- Jitsi - Mensajera instantnea segura de texto, audio y ... [Last Updated On: August 10th, 2016] [Originally Added On: August 10th, 2016]
- Jitsi - Wikipedia [Last Updated On: October 27th, 2016] [Originally Added On: October 27th, 2016]
- Trying to install jitsi meet with apache2 - Stack Overflow [Last Updated On: October 29th, 2016] [Originally Added On: October 29th, 2016]
- Jitsi softphone for Windows OnSIP Support [Last Updated On: November 23rd, 2016] [Originally Added On: November 23rd, 2016]
- Jitsi for Mac - Download - jitsi.en.softonic.com [Last Updated On: February 6th, 2017] [Originally Added On: February 6th, 2017]
- Jitsi for Windows - Secure Instant Messaging and VoIP [Last Updated On: February 11th, 2017] [Originally Added On: February 11th, 2017]
- Edward Snowden's New Job: Protecting Reporters From Spies - WIRED [Last Updated On: February 14th, 2017] [Originally Added On: February 14th, 2017]
- Snowden helping develop tools to protect journalists and whistleblowers - 'to make the game a little more fair' - Press Gazette [Last Updated On: February 15th, 2017] [Originally Added On: February 15th, 2017]
- Jitsi Meet - Android Apps on Google Play [Last Updated On: March 9th, 2017] [Originally Added On: March 9th, 2017]
- 5 Apps You Didn't Know You Needed - Syracuse University News [Last Updated On: April 3rd, 2017] [Originally Added On: April 3rd, 2017]
- Encrypted Chat Took Over. Let's Encrypt Calls, Too - Huffington Post [Last Updated On: April 25th, 2017] [Originally Added On: April 25th, 2017]
- Your Essential List of 7 Productivity Hacks and Time Management Tips - Business 2 Community [Last Updated On: May 11th, 2017] [Originally Added On: May 11th, 2017]
- Online privacy guide for journalists - Radioinfo (subscription) [Last Updated On: May 18th, 2017] [Originally Added On: May 18th, 2017]
- Diaspora* and Other Free Software Are Available in the Occitan Language, Thanks to Volunteer Translators - Global Voices Online [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- Jitsi Meet (advanced) Projects [Last Updated On: May 23rd, 2017] [Originally Added On: May 23rd, 2017]
- How to Configure and Set-Up Jitsi - Liberty Under Attack [Last Updated On: June 6th, 2017] [Originally Added On: June 6th, 2017]
- Jitsi - PediaView.com [Last Updated On: June 14th, 2017] [Originally Added On: June 14th, 2017]
- FAQ | Jitsi [Last Updated On: June 25th, 2017] [Originally Added On: June 25th, 2017]
- FAQ | Jitsi | Prometheism.net - euvolution.com [Last Updated On: June 26th, 2017] [Originally Added On: June 26th, 2017]
- Tsirang vegetable vendors commit to selling local chillies - Kuensel, Buhutan's National Newspaper [Last Updated On: June 27th, 2017] [Originally Added On: June 27th, 2017]
- FAQ | Jitsi | Futurist Transhuman News Blog [Last Updated On: June 29th, 2017] [Originally Added On: June 29th, 2017]
- FAQ | Jitsi | Prometheism.net euvolution.com | Futurist ... [Last Updated On: July 5th, 2017] [Originally Added On: July 5th, 2017]
- Jitsi | Futurist Transhuman News Blog - euvolution.com [Last Updated On: July 10th, 2017] [Originally Added On: July 10th, 2017]
- Gladstone gold does club proud - Gladstone Observer [Last Updated On: July 19th, 2017] [Originally Added On: July 19th, 2017]
- Fox Sports 1 Dials Up VCC for The Herd With Colin Cowherd - TV Technology [Last Updated On: December 22nd, 2019] [Originally Added On: December 22nd, 2019]
- Fox Sports 1 Utilized Video Call Center to Extend Reach of Shows Like The Herd with Colin Cowherd - Sports Video Group [Last Updated On: December 22nd, 2019] [Originally Added On: December 22nd, 2019]
- Home schooling tips: The things I wish I'd known before the schools went into lockdown - Telegraph.co.uk [Last Updated On: March 26th, 2020] [Originally Added On: March 26th, 2020]