
We also find instances of insiders instructingĪttackers to adopt the names of legitimate participants in the class to avoidĭetection, making countermeasures like setting up a waiting room and vetting This has important security implications,īecause it makes common protections against zoombombing, such as password Insiders who have legitimate access to these meetings, particularly students in Upon meeting invitations or bruteforcing their meeting ID, but rather by The vast majority of calls for zoombombing are not made by attackers stumbling These calls both quantitatively and qualitatively.

Identify over 200 calls for zoombombing between Twitter and 4chan, and analyze During the first seven months of 2020, we Identify posts that are calling for zoombombing attacks, and apply thematicĪnalysis to develop a codebook to better characterize the discussion Network, Twitter, and on a fringe community known for organizing coordinatedĪttacks against online users, 4chan. We identify ten popular online meeting tools and extract postsĬontaining meeting invitations to these platforms on a mainstream social The first data-driven analysis of calls for zoombombing attacks on social Of disrupting them and harassing their participants. Zoombombing has emerged, in which aggressors join online meetings with the goal


Opportunities for large scale harassment. Professional, educational, and personal lives. Download a PDF of the paper titled A First Look at Zoombombing, by Chen Ling and Utkucan Balc and Jeremy Blackburn and Gianluca Stringhini Download PDF Abstract: Online meeting tools like Zoom and Google Meet have become central to our
