Elusive Comet Strikes: How Zoom’s Remote Control Feature Became a Crypto Thief’s Best Friend

Elusive Comet hackers are using Zoom’s remote control feature to trick cryptocurrency users into handing over computer access. These cyber tricksters impersonate Bloomberg journalists, inviting targets to fake interviews. With their display name changed to Zoom, victims unwittingly grant access, thinking it’s a routine prompt. Moral of the story: never trust a comet!

Pro Dashboard

Hot Take:

Elusive Comet might be the new kid on the block, but they’re playing an old game with a fresh twist—imagine getting hacked while casually chatting about the latest crypto craze on Zoom! It’s like being invited to a fancy dinner, only to realize you’re the main course. So, next time Zoom asks to control your screen, remember, even digital requests deserve a good old-fashioned side-eye.

Key Points:

  • Elusive Comet exploits Zoom’s remote control feature in crafty social engineering attacks.
  • Their tactics echo those of the infamous Lazarus group linked to the Bybit crypto heist.
  • Attackers pose as Bloomberg journalists to lure high-value targets into fake Zoom interviews.
  • Their display name trickery makes victims think it’s Zoom itself asking for remote control.
  • Trail of Bits suggests ditching Zoom for security-critical environments to dodge these scams.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?