February 12, 2021 By David Bisson 2 min read

Video meeting company Zoom rolled out new options to counter the threat of “Zoom bombing.”

Suspending and Reporting

Zoom added two new security features in November 2020 that customers could use to address disruptive and uninvited callers, or Zoom bombers.

1. Suspend Participant Activities

This enables hosts and cohosts to suspend meeting functions, including video, audio, in-meeting chat and breakout rooms. If they choose that option, Zoom’s platform will ask attendees whether they would like to eject a Zoom-bombing user from the meeting and share any details, including but not limited to a screenshot.

Using this will remove the person from the call and notify Zoom’s Trust & Safety team. At that point, hosts and co-hosts can resume the meeting by turning functions back on one by one.

2. Reporting Disruptive Attendees

This enables users — not just hosts and co-hosts, but anyone in the meeting — to report disruptive behavior like Zoom bombing from within the Zoom client using the “Security” badge. All account owners and admins need to do is enable reporting for non-hosts in their web settings.

3. At-Risk Meeting Notifier

The release of these two features above complements the work of the At-Risk Meeting Notifier. The At-Risk Meeting Notifier scans social media posts and other websites for publicly shared Zoom meeting links. In the event it finds a link at risk of being disrupted by Zoom bombing, the tool alerts the account owner and provides guidelines for next steps. Those steps could involve canceling and rescheduling the meeting using a different meeting ID.

Understanding the Threat of Zoom Bombing

Zoom bombing is one of the most well-known risks with Zoom’s video meeting app. It’s when an uninvited guest joins a meeting when they might have discovered the meeting’s ID via a shared in a public forum. Threat actors can also try to guess a valid meeting ID, a tactic known as ‘war dialing’.

Once they’re inside, the attacker can mess with the meeting in several ways. For instance, they can hijack the meeting and then share inappropriate media or make insensitive comments.

Or, malicious actors could choose to remain quiet so they can spy on the meeting. In this way, they can get information such as who is involved, where they work and what they’re discussing. This in turn can be used to conduct other attacks, such as phishing campaigns in the future.

Zoom Security Best Practices

Researchers are constantly discovering new security threats and risks that affect Zoom and other video conferencing apps. Acknowledging that work, make an effort to implement updates for video conferencing software on an ongoing basis. Also, consider testing new features when the app developers make them available.

At the same time, organizations and users can take specific steps to minimize the threat of Zoom bombing or other meeting bombing. These security tips include not sharing meeting IDs on public websites such as social media platforms, using passwords to prevent anyone from joining a call, setting up waiting rooms to screen for unexpected guests and disabling automatic screen sharing. Lastly, remember you always have the option of ending a call if someone decides to hijack it.

More from News

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

CISA releases landmark cyber incident reporting proposal

2 min read - Due to ongoing cyberattacks and threats, critical infrastructure organizations have been on high alert. Now, the Cybersecurity and Infrastructure Security Agency (CISA) has introduced a draft of landmark regulation outlining how organizations will be required to report cyber incidents to the federal government. The 447-page Notice of Proposed Rulemaking (NPRM) has been released and is open for public feedback through the Federal Register. CISA was required to develop this report by the Cyber Incident Reporting for Critical Infrastructure Act of…

Recent developments and updates in Biden cyber policy

3 min read - The White House recently released its budget for the 2025 fiscal year, which supports the government’s commitment to cybersecurity. The cybersecurity funding allocations line up with the FY 2025 cybersecurity spending priorities released last year that included the following pillars: Defend critical infrastructure Disrupt and dismantle threat actors Shape market forces to drive security and resilience Invest in a resilient future Forge international partnerships to pursue shared goals. In 2023, the White House released a 35-page document detailing the new…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today