论文标题

首先看变焦炸弹

A First Look at Zoombombing

论文作者

Ling, Chen, Balcı, Utkucan, Blackburn, Jeremy, Stringhini, Gianluca

论文摘要

Zoom和Google Meet等在线会议工具已成为我们专业,教育和个人生活的核心。这为大规模骚扰打开了新的机会。特别是,一种被称为Zoombombing的现象出现了,其中侵略者参加在线会议,目的是破坏他们并骚扰参与者。在本文中,我们对在社交媒体上进行变质炸弹攻击的呼吁进行了首次数据驱动分析。我们在主流社交网络,Twitter和一个以对在线用户的协调攻击4CHAN闻名的边缘社区中,确定了十个流行的在线会议工具和提取帖子,其中包含对这些平台的会议邀请。然后,我们执行手动注释,以识别要求进行Zoombombing攻击的帖子,并应用主题分析来制定代码手册,以更好地表征有关探测炸弹炸弹的讨论。在2020年的前七个月中,我们确定了200多个在Twitter和4chan之间进行变速箱炸弹的电话,并在定量和定性上分析这些电话。我们的发现表明,攻击者在会议邀请或违反其会议ID的情况下跌跌撞撞的绝大多数呼吁不是通过合法访问这些会议的内部人士,尤其是高中和大学班的学生。这具有重要的安全性含义,因为它可以防止密码保护,例如密码保护,无效。我们还发现,内部人员指示攻击者采用班上合法参与者的名称以避免侦查,从而使建立候诊室和审查参与者的效率较低的对策。基于这些观察结果,我们认为,唯一有效的防御辩护是为每个参与者创建独特的联接链接。

Online meeting tools like Zoom and Google Meet have become central to our professional, educational, and personal lives. This has opened up new opportunities for large scale harassment. In particular, a phenomenon known as zoombombing has emerged, in which aggressors join online meetings with the goal of disrupting them and harassing their participants. In this paper, we conduct the first data-driven analysis of calls for zoombombing attacks on social media. We identify ten popular online meeting tools and extract posts containing meeting invitations to these platforms on a mainstream social network, Twitter, and on a fringe community known for organizing coordinated attacks against online users, 4chan. We then perform manual annotation to identify posts that are calling for zoombombing attacks, and apply thematic analysis to develop a codebook to better characterize the discussion surrounding calls for zoombombing. During the first seven months of 2020, we identify over 200 calls for zoombombing between Twitter and 4chan, and analyze these calls both quantitatively and qualitatively. Our findings indicate that the vast majority of calls for zoombombing are not made by attackers stumbling upon meeting invitations or bruteforcing their meeting ID, but rather by insiders who have legitimate access to these meetings, particularly students in high school and college classes. This has important security implications, because it makes common protections against zoombombing, such as password protection, ineffective. We also find instances of insiders instructing attackers to adopt the names of legitimate participants in the class to avoid detection, making countermeasures like setting up a waiting room and vetting participants less effective. Based on these observations, we argue that the only effective defense against zoombombing is creating unique join links for each participant.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源