作者: Gianluca Stringhini , Jeremy Blackburn , Chen Ling , Utkucan Balcı
DOI:
关键词:
摘要: Online meeting tools like Zoom and Google Meet have become central to our professional, educational, personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing emerged, in which aggressors join online meetings with the goal of disrupting them harassing their participants. this paper, we conduct first data-driven analysis calls attacks on social media. We identify ten popular extract posts containing invitations these platforms mainstream network, Twitter, fringe community organizing coordinated against users, 4chan. then perform manual annotation that are calling attacks, apply thematic develop codebook better characterize discussion surrounding zoombombing. During seven months 2020, over 200 between Twitter 4chan, analyze both quantitatively qualitatively. Our findings indicate vast majority not made by attackers stumbling upon or bruteforcing ID, but rather insiders who legitimate access meetings, particularly students high school college classes. important security implications, because it makes common protections zoombombing, such password protection, ineffective. also find instances instructing adopt names participants class avoid detection, making countermeasures setting waiting room vetting less effective. Based observations, argue only effective defense is creating unique links each participant.