Security

Court hearing on election security is zoombombed on 9/11 anniversary with porn, swastikas, pics of WTC attacks

Atlanta to upgrade software license with more protection, clerk tells us


A court hearing on election security in America failed in its own security efforts – when it was zoombombed with porn, swastikas and images of the World Trade Center attacks.

The public hearing in an Atlanta federal district court on Friday had approximately 100 people on a Zoom conference call before it was taken over by a participant named Osama who shared his screen and showed offensive images complete with music. At least one other person did the same. The images were particularly offensive as the hearing itself was being held on the anniversary of the September 11, 2001 attacks.

The court ended the Zoom session, and restarted it an hour later with additional security measures, including a virtual waiting room. Instead of sharing exhibits themselves, attorneys emailed them to the court and a staff member shared them.

Court clerk James Hatten told The Register the problem arose when the Zoom call was opened up to share exhibits, and the software enabled any participant to do the same.

Now that's a somewhat unexpected insider threat: Zoombombings mostly blamed on rogue participants, unique solution offered

READ MORE

Under a different license, it is possible for a Zoom host – in this case, the court – to designate specific participants as “panelists” and give them additional sharing rights, rather than open it to everyone. Hatten explained the court will shortly be moving to that license. “It’s been a little bit of a learning curve,” he confessed.

Courts have been increasingly using video conferencing as a way to continue processing cases during the COVID-19 pandemic; Zoom’s defaults and a lack of experience continues to cause problems. The link to this hearing was made public and the court did not vet participants.

The court has a record of the participants, and Hatten said it has already contacted law enforcement and would leave it up to them to determine whether a crime has been committed. The interruption would almost certainly be viewed as contempt of court but pragmatically, a judge is not in a position to do anything about a pseudonymous person on an online conference call.

A crime?

Federal prosecutors have made it plain in the past that they consider Zoombombing to be a crime that they are willing to charge people over. Back in March, Michigan’s top law officials put out a statement warning that “anyone who hacks into a teleconference can be charged with state or federal crimes. Charges may include, to name just a few, disrupting a public meeting, computer intrusion, using a computer to commit a crime, hate crimes, fraud, or transmitting threatening communications.”

The statement also noted that “all of these charges are punishable by fines and imprisonment.”

Just this month there was what may be the first case of someone charged with zoombombing: 19-year-old Ibraheem Ahmed al Bayati is accused of interrupting classes by threatening, during an online Zoom lecture, to bomb the University of Houston.

But less egregious examples of zoombombing have been dealt with differently. Last month, the small town of Sylva in North Carolina decided that no crime had been committed when its town board meeting in June, taking place over Zoom, was disrupted by participants shouting racist abuse.

We asked Zoom for details over how it deals with zoombombing, particularly when it comes to requests and complaints from law enforcement. The biz sidestepped those questions, with a spokesperson telling us: "We have been deeply upset to hear about these types of incidents, and Zoom strongly condemns such behavior. We have recently updated a number of default settings and added features to help hosts more easily access in-meeting security controls, including controlling screen sharing, removing and reporting participants, and locking meetings, among other actions.

"We encourage users to report any incidents of this kind to Zoom and law enforcement authorities so the appropriate action can be taken against offenders." ®

Send us news
27 Comments

Microsoft squashes SmartScreen security bypass bug exploited in the wild

Plus: Adobe, SAP, Fortinet, VMware, Cisco issue pressing updates

Cisco creates architecture to improve security and sell you new switches

Hypershield detects bad behavior and automagically reconfigures networks to snuff out threats

OpenAI's GPT-4 can exploit real vulnerabilities by reading security advisories

While some other LLMs appear to flat-out suck

US government excoriates Microsoft for 'avoidable errors' but keeps paying for its products

In what other sphere does a bad supplier not feel pain for its foulups?

Japanese government rejects Yahoo<i>!</i> infosec improvement plan

Just doesn't believe it will sort out the mess that saw data leak from LINE messaging app

Ransomware feared as IT 'issues' force Octapharma Plasma to close 150+ centers

Source blames BlackSuit infection – as separately ISP Frontier confirms cyberattack

Crooks exploit OpenMetadata holes to mine crypto – and leave a sob story for victims

'I want to buy a car. That's all'

Fire in the Cisco! Networking giant's Duo MFA message logs stolen in phish attack

Also warns of brute force attacks targeting its own VPNs, Check Point, Fortinet, SonicWall and more

Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways

Out of the PAN-OS and into the firewall, a Python backdoor this way comes

French issue <em>alerte rouge</em> after local governments knocked offline by cyber attack

Embarrassing, as its officials are in the US to discuss Olympics cyber threats

It's 2024 and Intel silicon is still haunted by data-spilling Spectre

Go, go InSpectre Gadget

H-1B visa fraud alive and well amid efforts to crack down on abuse

It's the gold ticket favored by foreign techies – and IT giants suspected of gaming the system