Hackers Use Zoom’s Remote Control Feature To Steal Crypto

Image by rawpixel.com, from Freepik

Hackers Use Zoom’s Remote Control Feature To Steal Crypto

Reading time: 2 min

Cybercriminals posing as journalists are exploiting Zoom’s remote control feature to hijack devices and steal cryptocurrency during staged interviews.

In a rush? Here are the quick facts:

  • Attackers spoof Zoom prompts to gain full computer access.
  • Group ELUSIVE COMET linked to $1.5B Bybit theft.
  • Victims lured with fake “Bloomberg Crypto” Zoom interviews.

Hackers are exploiting Zoom’s remote control feature to steal cryptocurrency, according to cybersecurity firm Trail of Bits.

The group responsible for the attacks operates under the name ELUSIVE COMET and is suspected to be involved in the $1.5 billion Bybit theft that took place in February. The attackers are now targeting cryptocurrency professionals by pretending to be journalists and inviting them to fake interviews.

The scam typically begins on X , where victims receive a message inviting them to appear on a fraudulent “Bloomberg Crypto” segment. Instead of using official communication channels, the attackers rely on untrustworthy scheduling tools and spoofed Zoom invitations.

During the Zoom call, the attackers enable the platform’s remote control function, a legitimate feature that allows one user to control another’s screen if given permission. They disguise their identity by renaming themselves “Zoom,” making their request appear like a routine system message. If the victim approves the request, the attacker can immediately install malware or extract sensitive data.

Trail of Bits warned that users are often conditioned to click “Approve” on Zoom prompts without considering the consequences, making it easy for attackers to gain full access.

SEAL and Trail of Bits argue that this scam marks a shift in the cybercrime landscape. Instead of exploiting software flaws, attackers are manipulating user behavior and exploiting familiar interfaces. As the team stated, the blockchain industry is entering a new phase of security threats, where human habits pose more risk than technical vulnerabilities.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
0 Voted by 0 users
Title
Comment
Thanks for your feedback
Loader
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Loader
Loader Show more...