Zoombombing or Zoom raiding [1] is the unwanted, disruptive intrusion, generally by Internet trolls, into a video-conference call. In a typical Zoombombing incident, a teleconferencing session is hijacked by the insertion of material that is lewd, obscene, or offensive in nature, typically resulting in the shutdown of the session or the removal of the troll. The term is especially associated with and is derived from the name of the Zoom videoconferencing software program, but it has also been used to refer to the phenomenon on other video conferencing platforms. The term became popularized in 2020 when the COVID-19 pandemic forced many people to stay at home, and videoconferencing came to be used on a large scale by businesses, schools, and social groups.
Zoombombing has caused significant issues in particular for schools, companies, and organizations worldwide. Such incidents have resulted in increased scrutiny on Zoom as well as restrictions on usage of the platform by educational, corporate, and governmental institutions globally. In response, Zoom, citing the sudden influx of new users due to the COVID-19 pandemic, took measures to increase security of its teleconferencing application. Incidents of Zoombombing have prompted law enforcement officers in various countries to investigate such cases and file criminal charges against those responsible.
The term "Zoombombing" is derived from the teleconferencing application Zoom and coined in 2020, [2] though the term has also been used in reference to similar incidents on other teleconferencing platforms, such as WebEx or Skype. [3] The increased use of Zoom during the COVID-19 pandemic as an alternative to face-to-face meetings resulted in widespread exposure to hackers and Internet trolls, who exploit and work around the application's security features. [2] In various forums such as Discord and Reddit, efforts have been coordinated to disrupt Zoom sessions, while certain Twitter accounts advertise meeting IDs and passwords or meeting links (allowing users to instantly join a Zoom meeting instead of entering the credentials required to access a meeting) for sessions that were vulnerable to being joined without authorization. [4] At educational institutions, some students were "actively asking strangers to Zoombomb or 'Zoom raid' their virtual classrooms to spice up their isolated lessons" and facilitating the raids by sharing passwords with the raiders. [5] CNET pointed out that simple Google searches for URLs that include "Zoom.us" could bring up conferences that are not password protected, and that links within public pages can allow anyone to join. [6] Hackers and trolls also look for easy targets such as unprotected or underprotected "check-in" meetings in which organizations meet with their employers or clients remotely. [7]
While a Zoom session is in progress, unfamiliar users show up and hijack the session by saying or showing things that are lewd, obscene, or racist in nature. [8] [9] The compromised Zoom session is then typically shut down by the host. [2] [10] Many of those successful in disrupting sessions have posted video footage of those incidents to social media and video sharing platforms such as TikTok and YouTube. [8]
While it is believed Zoombombing attacks are mainly orchestrated by external hackers and trolls, many are also orchestrated internally from within their respective organization or entity. [11] Some view Zoombombing as a continuation of cyberbullying by teenagers, particularly after schools were shut down due to the pandemic. [12]
Zoombombings would frequently make the local news for how disruptive they are. [9]
The trolling has caused a number of problems for schools and educators, with unwanted participants posting lewd content to interrupt learning sessions. [10] [13] [14] Some schools had to suspend using video conferencing altogether. [15] The University of Southern California called Zoombombing a type of trolling and apologized for "vile" events that interrupted "lectures and learning." [16] Zoombombing has prompted colleges and universities to publish guides and resources to educate and bring awareness to their students and staff about the phenomenon. [17] Zoombombing has left online lectures vulnerable to the intrusion of people looking to inflict harm. These crimes have brought attention not only to the lack of security on videoconferencing platforms, but also the lack in the universities. According to an article from The Guardian , the University of Warwick, in the midst of a rape-chat scandal, received criticisms for its weak cybersecurity. [18]
Zoombombing affected twelve-step programs such as Alcoholics Anonymous and Narcotics Anonymous and other substance abuse and addiction recovery programs who were forced to switch to online meetings. Concerns arise from causing undue stress to an already vulnerable population and video recording which can break anonymity. [19] [20] Some bombers reference the drug-of-choice for recovery members, such as alcohol, in an attempt to emotionally trigger the participants of the meeting. [19]
The problem reached such prominence that the United States Federal Bureau of Investigation (FBI) warned of video-teleconferencing and online classroom hijacking, which it called "Zoom-bombing." [21] [22] The FBI advised users of teleconferencing software to keep meetings private, require passwords or other forms of access control such as "waiting rooms" to limit access only to specific people, and limiting screen-sharing access to the meeting host only. [21] Given the number of incidents of Zoombombing, New York's attorney general initiated an inquiry into Zoom's data privacy and security policies. [23] U.S. Senator Sherrod Brown (D-OH) asked the Federal Trade Commission to investigate into the matter, accusing Zoom of engaging in deceptive practices regarding user privacy and security. [24]
Amid concerns about Zoombombing, various organizations banned the use of Zoom. In April 2020, Google banned the use of Zoom on its corporate computers, directing employees to instead use its video chat app Google Duo. [25] The use of Zoom was also banned by SpaceX, Smart Communications, NASA, and the Australian Defence Force. [25] The Taiwanese and Canadian governments banned Zoom for all government use. [26] The New York City Department of Education prohibited all its teachers from using the platform with students, and the Clark County School District in Nevada disabled access to Zoom to its staff. [27] Singapore's Ministry of Education briefly banned all teachers within the country from using Zoom [28] [29] before lifting the ban three days later, adding extra security features. [30] Some Zoombombers have shared their side of the story, claiming they aren't trying to cause harm. They claim it is a form of protest in response to the extensive amount of work given from teachers. Not all incidents are malicious, as many have shared some new pop culture, such as memes and TikToks, to bring some relief and fun during the pandemic. [1]
Zoom CEO Eric Yuan made a public apology, saying that the teleconferencing company had not anticipated the sudden influx of new consumer users and stating that "this is a mistake and lesson learned." [31] [32] In response to the concerns, Zoom has published a guide on their blog on how to avoid these types of incidents. [33] On April 7, 2020, Zoom implemented user experience and security updates to the application. Such updates include a more visible "Security" icon for users to see and use, suppression of meeting ID numbers, [32] and a change in the default settings to require passwords and waiting rooms for sessions. [34] On April 8, 2020, Zoom announced that it had formed a council of chief information security officers from other companies to share ideas on best practices, and that it had hired Alex Stamos, former chief security officer of Facebook, as an adviser. [35] Zoom released its 5.0 version in April 2020 with security features that include AES 256-bit GCM encryption, passwords by default, and a feature to report suspicious users to its Trust and Safety Team for possible misuse. [36] [37] In May 2020, Zoom announced it had temporarily disabled its Giphy (frequently used as a tactic in Zoombombing) integration until security concerns could be properly and fully addressed. [38] On July 1, 2020, Zoom stated it had released 100 new safety features over the past 90 days, including end-to-end encryption for all users, turning on meeting passwords by default, giving users the ability to choose which data centers calls are routed from, consulting with security experts, forming a CISO council, an improved bug bounty program, and working with third parties to help test security. [39] [40]
National authorities worldwide warned of possible charges against people engaging with Zoombombing. [41] [42] On April 8, 2020, a teen in Madison, Connecticut, was arrested for computer crime, conspiracy, and disturbing the peace following a Zoombombing incident involving online classes at Daniel Hand High School; police also identified another teen involved in the incident. [43] In San Francisco, a man was arrested after being traced to pornographic videos that were streamed on Zoom. [44] As of May 2020, the FBI has received 195 incidents of Zoombombing involving child abuse, [45] while the United Kingdom's National Crime Agency has reported more than 120 such cases. [46]
St. Paulus Lutheran Church in San Francisco filed a class-action lawsuit against Zoom after one of its Bible study classes was "Zoombombed" on May 6, 2020. [47] The church alleged that Zoom "did nothing" when it tried to reach out to the company. [48]
In November 2020, a Dutch journalist for RTL Nieuws managed to gain access to a secret Zoom meeting of European Union defence ministers. The EU's foreign affairs representative Josep Borrell told him that it was criminal and he should sign off before the police arrived. The Zoombomb was revealed to have been a result of the Dutch defence minister Ank Bijleveld posting a picture of himself that showed the login and the partial PIN number. [49]
In 2022, an online event hosted by the Italian Senate's Movimento 5 Stelle and broadcast live to Senato della Repubblica was interrupted by roughly a minute of a 3D animated Final Fantasy VII pornographic parody, displaying the character Tifa Lockhart in the middle of sexual intercourse. [50] [51] Overlapping the content's original audio was a man speaking English with a thick Italian accent stating, "I used to be a sex offender, but now I am a kindergarten teacher." [52]
Brian Adams, a man from Paintsville, Kentucky, faced multiple federal charges after he interrupted an elementary school's video conference class during the COVID-19 pandemic with a digital racist threat. He allegedly crashed a class Zoom conference on October 14, 2020 and targeted the Laureate Academy Charter School, whose student population is about 67% Black, because of its racial demographics. [53]
In 2020, livestreamer Muudea Sedik, better known as twomad, gained popularity for his Zoom bombings. Sedik would request Zoom meeting links or passwords from his followers on social media, and would broadcast the subsequent invasions live. Sedik's antics made him a popular subject for various Internet memes, particularly among Generation Z. [54]
Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.
Crimeware is a class of malware designed specifically to automate cybercrime.
The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.
A broadcast signal intrusion is the hijacking of broadcast signals of radio, television stations, cable television broadcast feeds or satellite signals without permission or licence. Hijacking incidents have involved local TV and radio stations as well as cable and national networks.
4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from video games and television to literature, cooking, weapons, music, history, anime, fitness, politics, and sports, among others. Registration is not available, except for staff, and users typically post anonymously. As of 2022, 4chan receives more than 22 million unique monthly visitors, of whom approximately half are from the United States.
Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.
Andrew Alan Escher Auernheimer, best known by his pseudonym weev, is an American computer hacker and professional Internet troll. Affiliated with the alt-right, he has been described as a neo-Nazi, white supremacist, and antisemitic conspiracy theorist. He has used many aliases when he has contacted the media, but most sources state that his real first name is Andrew.
The 2012 LinkedIn hack refers to the computer hacking of LinkedIn on June 5, 2012. Passwords for nearly 6.5 million user accounts were stolen. Yevgeniy Nikulin was convicted of the crime and sentenced to 88 months in prison.
xHamster is a pornographic media and social networking site headquartered in Limassol, Cyprus. xHamster serves user-submitted pornographic videos, webcam models, pornographic photographs, and erotic literature and incorporates social networking features. xHamster was founded in 2007. As of August 2024, it is the 33rd-most-visited website in the world and the third-most-visited adult website after Pornhub and XVideos.
Zoom Video Communications, Inc. is a communications technology company primarily known for the videoconferencing application Zoom. The company is headquartered in San Jose, California, United States. The company was founded in 2011 by Eric Yuan, a former Cisco engineer and executive. It launched its software in 2013. Its software products have faced public and media scrutiny related to security and privacy issues, though the company has taken measures to address these issues.
On August 31, 2014, a collection of nearly five hundred private pictures of various celebrities, mostly women, with many containing nudity, were posted on the imageboard 4chan, and swiftly disseminated by other users on websites and social networks such as Imgur and Reddit. The leak was dubbed "The Fappening" or "Celebgate" by the public. The images were initially believed to have been obtained via a breach of Apple's cloud services suite iCloud, or a security issue in the iCloud API which allowed them to make unlimited attempts at guessing victims' passwords. Apple claimed in a press release that access was gained via spear phishing attacks.
Pornhub is a Canadian-owned internet pornography video-sharing website, one of several owned by adult entertainment conglomerate Aylo. As of August 2024, Pornhub is the 16th-most-visited website in the world and the most-visited adult website.
Credential stuffing is a type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords, and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application. Unlike credential cracking, credential stuffing attacks do not attempt to use brute force or guess any passwords – the attacker simply automates the logins for a large number of previously discovered credential pairs using standard web automation tools such as Selenium, cURL, PhantomJS or tools designed specifically for these types of attacks, such as Sentry MBA, SNIPR, STORM, Blackbullet and Openbullet.
Google Meet is a video communication service developed by Google. It is one of two apps that constitute the replacement for Google Hangouts, the other being Google Chat. It replaced the consumer-facing Google Duo on November 1, 2022, with the Duo mobile app being renamed Meet and the original Meet app set to be phased out.
Zoom is a proprietary videotelephony software program developed by Zoom Video Communications. The free plan allows up to 100 concurrent participants, with a 40-minute time restriction. Users have the option to upgrade by subscribing to a paid plan, the highest of which supports up to 1,000 concurrent participants for meetings lasting up to 30 hours.
On July 15, 2020, between 20:00 and 22:00 UTC, 130 high-profile Twitter accounts were reportedly compromised by outside parties to promote a bitcoin scam. Twitter and other media sources confirmed that the perpetrators had gained access to Twitter's administrative tools so that they could alter the accounts themselves and post the tweets directly. They appeared to have used social engineering to gain access to the tools via Twitter employees. Three individuals were arrested by authorities on July 31, 2020, and charged with wire fraud, money laundering, identity theft, and unauthorized computer access related to the scam.
Account pre-hijacking attacks are a class of security exploit related to online services. They involve anticipating a user signing up for an online service and signing up to the service in their name, and then taking over their account when they attempt to register it themselves. The attack relies on confusion between accounts created by federated identity services and accounts created using e-mail addresses and passwords, and the failure of services to resolve this confusion correctly.
OGUsers (OGU) is an Internet forum that facilitates the discussion and buying of social media accounts and online usernames. Established in 2017, the website is dedicated to the buying and selling of "rare" or "OG" online accounts that are considered valuable due to their name or age. The website acts as a platform for cybercrime and the harassment of individuals for access to their online accounts. Several high-profile incidents have been linked to the forum, most notably the 2020 Twitter account hijacking.
Muudea Sedik, known online as twomad, was a Canadian YouTuber and live streamer based in Los Angeles. Sedik created his main YouTube channel in 2017. He made gaming videos before becoming known as an Internet troll. Several clips of him became Internet memes, which allowed him to gain a following online. On February 13, 2024, Sedik was found deceased in his residence due to a morphine overdose.
"Zoombombing" or "Zoom raiding" by uninvited participants have become frequent
people turn to video-teleconferencing (VTC) platforms to stay connected in the wake of the COVID-19 crisis, reports of VTC hijacking (also called "Zoom-bombing") are emerging
Over the last few weeks, internet trolls have exploited a Zoom screen-sharing feature to hijack meetings and do things like interrupt educational sessions or post white supremacist messages to a webinar on anti-Semitism — a phenomenon called "Zoombombing." [...] "We appreciate the New York attorney general's engagement on these issues
{{cite web}}
: CS1 maint: bot: original URL status unknown (link)