Security News > 2020 > September > Now that's a somewhat unexpected insider threat: Zoombombings mostly blamed on rogue participants, unique solution offered
This makes sense when you consider that more meetings require passwords or passcodes, to avoid these sorts of hijackings, thus making rogue participants, particularly in a classroom setting, a more common threat.
"Our findings indicate that the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings, particularly students in high school and college classes," the researchers said.
Studying meetings across ten different services and observing troll activity on both Twitter and 4Chan, the team was able to create a general framework for how trolls plan to disrupt meetings.
More often than not, they say, it was someone inside the meeting group - a disruptive student wanting to derail a class session, for example - that gives the login details to other trolls who then invade the meeting and cause havoc.
"To protect against the threat, we encourage online meeting services to allow hosts to create unique meeting links for each participant, although we acknowledge that this has usability implications and might not always be feasible," the team wrote.
News URL
https://go.theregister.com/feed/www.theregister.com/2020/09/10/zoombombing_attacks_texas/