What is a Zoom-bomber?

Zoom is a synchronous (live) web conferencing tool that is fantastic for fostering meaningful instructor-student and student-student interactions. It is being used by many faculty to assist them with a smooth transition to temporary remote teaching and learning. 


However, in this time of disruption, there has been an increased likelihood that you may have uninvited attendees show up in your meetings and deliberately try to derail it. During the COVID-19 period, educators and businesses alike are reporting incidents of “Zoom-bombing” or “Zoom trolls.” The following tips are provided to help you continue with your synchronous instruction in Zoom without the burden of uninvited attendees.


If you would like more information related to Zoom Bombings, please return to the Bombing High Security Menu Recommendations for Zoom (CLICK HERE).


If you would like to use more strict security settings: please review the Zoom Bombing Information Folder in the Support Portal (CLICK HERE). 

 

Starting Points for Zoom Meeting Security 

       

Tip 1 - Disable "Join Before Host" (Can be done in the Profile level Settings menu)

Tip 2 - Turn "Waiting Room" ON (Can be done in the Profile level Settings menu) 

Tip 3 - Disable "Allow removed participants to rejoin" (Can be done in the Profile level Settings menu) 

Tip 4 - Do not use your Personal Meeting ID (When scheduling a meeting).

Tip 5 - Set a password for the meeting (When scheduling a meeting). 

Tip 6 - Before allows attendees entry into the meeting, disable their ability to unmute themselves. (In the Meeting)

Tip 7 - Remove all attendees that you do not recognize or that are showing questionable behavior. (In the Meeting)

Tip 8 - When all expected attendees are in the meeting, Lock the Meeting. (In the Meeting)



Zoom Bombings are divided in to 3 main groups


Visual Attacks: These include inappropriate imagery via virtual backgrounds, screen sharing, annotation and camera.


Auditory Attacks: Including but not limited to, obscenities, hate speech and threats of violence.


Chat attacks: This includes the written equivalent of Group 2, but also could includes the usage of Zoom Chat's File transfer capability for distributing images, videos and executable files.



There are generally 2 types of Zoom Bombers


    Berserkers: Begins the attack immediately upon entering a meeting and continues until the meeting is stopped by the host or until they are removed from the meeting. Please note, because they were able to get into the                 meeting once, they will most likely attempt to do so again as quickly as possible.


    Ghosts: Attempts to portray themselves as an invited attendee of the meeting (commonly without a camera being shared). They will commonly change their displayed name to be the same as other participants or to be blank.         These attackers are normally more disruptive after the meeting has started going and they operate in short actions and then try to 'hide.'




- For more information on and steps for Basic Menu Security Recommendations for Preventing Zoom Bombings  (CLICK HERE)


- For more information on and steps for Scheduling a Secure Meeting (CLICK HERE)


- For more information on and steps for Safely Starting a Zoom Meeting in the age of Zoom Bombings (CLICK HERE)