
Image by rawpixel.com, from Freepik
Hackers Use Zoom’s Remote Control Feature To Steal Crypto
Cybercriminals posing as journalists are exploiting Zoom’s remote control feature to hijack devices and steal cryptocurrency during staged interviews.
In a rush? Here are the quick facts:
- Attackers spoof Zoom prompts to gain full computer access.
- Group ELUSIVE COMET linked to $1.5B Bybit theft.
- Victims lured with fake “Bloomberg Crypto” Zoom interviews.
Hackers are exploiting Zoom’s remote control feature to steal cryptocurrency, according to cybersecurity firm Trail of Bits.
The group responsible for the attacks operates under the name ELUSIVE COMET and is suspected to be involved in the $1.5 billion Bybit theft that took place in February. The attackers are now targeting cryptocurrency professionals by pretending to be journalists and inviting them to fake interviews.
The scam typically begins on X , where victims receive a message inviting them to appear on a fraudulent “Bloomberg Crypto” segment. Instead of using official communication channels, the attackers rely on untrustworthy scheduling tools and spoofed Zoom invitations.
During the Zoom call, the attackers enable the platform’s remote control function, a legitimate feature that allows one user to control another’s screen if given permission. They disguise their identity by renaming themselves “Zoom,” making their request appear like a routine system message. If the victim approves the request, the attacker can immediately install malware or extract sensitive data.
Trail of Bits warned that users are often conditioned to click “Approve” on Zoom prompts without considering the consequences, making it easy for attackers to gain full access.
SEAL and Trail of Bits argue that this scam marks a shift in the cybercrime landscape. Instead of exploiting software flaws, attackers are manipulating user behavior and exploiting familiar interfaces. As the team stated, the blockchain industry is entering a new phase of security threats, where human habits pose more risk than technical vulnerabilities.
Leave a Comment
Cancel