visit
In this Coronavirus era, as if daily news briefings on the pandemic-related deaths weren't enough, a new wave of . In the U.S., , accusing the company of making hightenend claims about user privacy and security. As a Security Researcher then, I just had to look more into this!
Wikipedia defines or Zoom raiding as “the unwanted intrusion into a video conference call by an individual, which causes disruption.” The moniker gained notoriety during the COVID-19 crisis when many depend on Zoom for conferencing, remote schooling and working from home.
The idea is to troll the participants and invite ridicule into the meeting, while some other blackhat hackers might choose to do this to educate people about security flaws in their daily workflow, albeit unethically.
Image credit: —Boris Johnson’s Twitter feed shows the prime minister taking part in a virtual cabinet Zoom meeting with the meeting ID (539–544–323) atop the window raising security and privacy concerns.
British PM Johnson (which is still up) of virtual cabinet meeting taking place over Zoom, which drew further attention of some, calling the tweet a “,” since it exposed the meeting ID.In all this ‘noise’ and , however, Zoom got scapegoated because of its sheer popularity and widespread user preference across multiple domains: business, education, social groups — not because zoombombing is in itself an exploitable security vulnerability or risk unique to Zoom. The custom of letting participants join video conferences via meeting IDs, often without imposing PIN requirements, is nothing novel and has been practiced for decades…
Zoom even has security features to deter or prevent “zoombombing” altogether, such as screening participants prior to letting them join, or . It is then the lazy or technologically inept meeting organisers who are not leveraging Zoom’s complete set of features, and not the product itself that's flawed.
Recent headlines which steer people’s attention towards Zoom smell more like a smear campaign designed by Zoom’s competitors than a major cause of concern.My professional opinion is, “zoombombing” is not even an exploitable security vulnerability, strictly speaking in cybersecurity terms. It’s being misunderstood as such by a layperson.
It’s analogous to using any digital product out of the box — such as your WiFi router, without properly configuring it, and then later complaining that you got hacked because you didn’t setup a password. Simply switching your WiFi router brand in that case, would do no good to protect you, should you continue to engage in the same complacency of not setting up a WiFi password!In conclusion, a “flaw” that impacts almost all video conferencing apps, or has at some point, is now being uniquely attributed to Zoom, and this is misleading to users as it creates a false sense of security. Moving to a different conferencing app won’t safeguard you against “zoombombing” unless commonsense security measures are enforced by meeting organisers.
© 2020. (). All Rights Reserved.Previously published at