Zoombombing Trolling Spreads

zoombombing
 

Zoom’s video-conferencing software has seen a surge in hacked video calls around the world, with a new phenomenon, ‘Zoombombing’, disrupting unsecured conference calls.

As large numbers of people work from home due to Covid-19, online trolls have begun searching for Zoom calls where meeting hosts have not passworded access or credentials are easily obtainable, and disrupting meetings with either audio or un-expected screensharing of inappropriate material to other attendees.

Zoom’s ease-of-use for beginners and freemium download option have proved popular in recent weeks with the platform surging to over 200 million users – a pattern also seen among similar conferencing platforms from Microsoft, Cisco, Google and others.

Cyber security experts have also highlighted the availability of automated Zoom-call hacking tools in the darker corners of the web – able to seek out conference calls without passwords for trolls to exploit.

Most experts believe Zoombombing intruders can be avoided with routine security precautions which should be taken by the host (and co-hosts) of any Zoom meeting.

In particular Zoom meeting hosts have been cautioned to:


  1. Set a unique, complex password for every Zoom meeting
  2. Generate a random ID for each meeting, try to avoid using your personal one. Zoom have published a helpful article on how to do this. 
  3. Not share screenshots of their meetings. (Even UK Government Cabinet Ministers’ accidentally publishing shared calls with visible meeting IDs recently. Don’t do it!)
  4. Avoid sharing meeting IDs on publicly visible social media or websites.
  5. Disabling screen-sharing rights unless needed via Screen Share > Advanced Sharing Options > Who Can Share?
  6. Enforcing Waiting Room prior to new attendees being permitted to join the meeting
  7. Lock Meetings once all attendees are present via Participants List > More > Lock Meeting

For Cybersecurity expertise & IT Support, please contact Lineal today