Think your Zoom meeting is safe from Zoombombing? Think again…

online meeting
(Image credit: aslysun / Shutterstock)

The rise of Zoom during the Covid-19 pandemic has been incredibly impressive, with many of us now using the tool to host meetings with colleagues, take online classes or keep in touch with friends and loved ones. But this has also made the service a target for malicious users, who gate-crash meetings and harass the participants.

Known as ‘Zoombombing’, these disruptions have ranged from annoying to downright offensive and scary, and a new report, titled A First Look at Zoombombing, has found that many of the most popular ways of protecting our Zoom meetings – as well as video calls on other services – are simply not effective.

While individuals and organisations have tried to protect their meetings using passwords, not giving out links publicly, or even announcing their meetings outside of their employees, the report suggests that these aren’t always effective due to one incorrect assumption: that the malicious ‘zoombombers’ are outside attacks from users who have hacked into a random meeting.

Rather worryingly, the report suggests that “the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings.”

Inside jobs?

The paper was written by researchers from Boston University and the State University of New York at Binghamton, who studied evidence of zoombombing calls, along with posts on sites such as Twitter and 4chan.

It found that users with legitimate invites to these meetings were either sharing the information with other people, or performing the zoombombing themselves, and that this was particularly affecting zoom meetings and classes in high schools and colleges.

The paper identifies three main security countermeasures that people and organisations put in pace to protect their online meetings, which are password protecting the meetings, avoiding public announcements of the meetings on social media, and using the Waiting Room feature of Zoom to admit people to the meeting.

As the researchers found, these measures may offer protection against random attacks, but are pretty much useless if the zoombombing is orchestrated by someone with a legitimate invite.

It means passwords are shared, as well as details about the meetings. Names of other legitimate invitees can also be shared, which allows malicious users to sign in under a different name, which means the Waiting Room feature becomes less effective.

Also, the larger the Zoom meeting, the harder it is to vet every participant.

Zoom

(Image credit: Shutterstock)

So, what can be done? The researchers suggest that the most effective protection is by creating personalized meeting links. “This way, as long as the insider joins the meeting, unauthorized people will not be able to join using the same link.”

While this could help, at the moment only Zoom and Webex allow personalized meeting links. The researchers are encouraging other services to adopt these features.

As Arstechnica reports, Zoom provided a comment, saying that “Zoom offers unique link capabilities when meeting registration is turned on. We have also recently updated a number of default settings and added features to help hosts more easily access in-meeting security controls, including controlling screen sharing, removing and reporting participants, and locking meetings, among other actions.”

The company is also working with users to educate them in securing their meetings, and is encouraging anyone who experiences a zoombombing to report the incidents to Zoom and law enforcement.

TOPICS
Matt Hanson
Managing Editor, Core Tech

Matt is TechRadar's Managing Editor for Core Tech, looking after computing and mobile technology. Having written for a number of publications such as PC Plus, PC Format, T3 and Linux Format, there's no aspect of technology that Matt isn't passionate about, especially computing and PC gaming. He’s personally reviewed and used most of the laptops in our best laptops guide - and since joining TechRadar in 2014, he's reviewed over 250 laptops and computing accessories personally.

Latest in Software & Services
Windows 11 Start menu layout choices: Grid view
Windows 11 vs Linux for business: which operating system should you embrace?
A phone sitting on a laptop keyboard with the Microsoft Outlook logo on the screen.
Gmail vs Outlook for business: which email system is right for your organization?
Windows 11 logo
Windows 11 Pro vs Windows 11 Home: which version is right for you?
Canva HubSpot
HubSpot and Canva team up to level the creative playing field
a laptop computer
Windows 11 vs ChromeOS for business: Is one better than the other for your needs?
a laptop computer
Windows 11 vs macOS for business: which side are you on?
Latest in News
Apple's Craig Federighi demonstrates the iPhone Mirroring feature of macOS Sequoia at the Worldwide Developers Conference (WWDC) 2024.
Report: iOS 19 and macOS 16 could mark their biggest design overhaul in years – and we have one request
Google Gemini Calendar
Gemini is coming to Google Calendar, here’s how it will work and how to try it now
Lego Mario Kart – Mario & Standard Kart set on a shelf.
Lego just celebrated Mario Day in the best way possible, with an incredible Mario Kart set that's up for preorder now
TCL QM7K TV on orange background
TCL’s big, bright new mid-range mini-LED TVs have built-in Bang & Olufsen sound
Apple iPhone 16e
Which affordable phone wins the mid-range race: the iPhone 16e, Nothing 3a, or Samsung Galaxy A56? Our latest podcast tells all
An image of a Jackbox Games Party Pack
Jackbox games is coming to smart TVs in mid-2025, and I can’t wait to be reunited with one of my favorite party video games