

Or, in this case, if people aren’t breaking into Zoom calls on their own, someone on the call must be willfully letting them in.

To quote Sherlock Holmes’ popular aphorism: When you have eliminated the impossible, whatever remains, must be the truth.

And while human error was certainly possible, in terms of people leaving Zoom links lying around, this also seemed improbable. How were they getting in? They could be brute-forcing the call IDs, but given the size of the search space, it seemed unlikely that they would be able to consistently find active calls to target. He was intrigued by the rise of Zoombombing as a phenomenon, but also not entirely convinced by the theories. It was an act of attack that the Zoombombers were perpetuating, just by themselves.” Lone wolves, online packsīlackburn’s major research interest, his university website profile notes, involves “understanding jerks on the internet,” from toxic behavior and hate speech to fringe and extremist web communities. “ these outsiders who were randomly showing up, somehow finding a link to a meeting. “There were a lot of people that thought that maybe this was some kind of clever hacking, or else finding people that would accidentally post Zoom links on social media or sending out email blasts,” Jeremy Blackburn, an assistant professor of computer science at Binghamton University, told Digital Trends. To draw an analogy with creepy campfire stories about terrified babysitters: “The calls are coming from inside the house.” Well, kind of. According to a world’s-first study they have carried out, the majority of Zoombombing incidents are actually inside jobs.

Zoom, whose usage exploded during the pandemic, was suddenly at the center of what appeared to be a glaring vulnerability problem: It was as if the leading manufacturer of front door locks revealed a high failure rate during a home invasion epidemic.īut researchers from Binghamton University in New York say there’s more to this story than meets the eye.
