Elusive Comet Strikes: How Zoom’s Remote Control Feature Became a Crypto Thief’s Best Friend
Elusive Comet hackers are using Zoom’s remote control feature to trick cryptocurrency users into handing over computer access. These cyber tricksters impersonate Bloomberg journalists, inviting targets to fake interviews. With their display name changed to Zoom, victims unwittingly grant access, thinking it’s a routine prompt. Moral of the story: never trust a comet!

Hot Take:
Elusive Comet might be the new kid on the block, but they’re playing an old game with a fresh twist—imagine getting hacked while casually chatting about the latest crypto craze on Zoom! It’s like being invited to a fancy dinner, only to realize you’re the main course. So, next time Zoom asks to control your screen, remember, even digital requests deserve a good old-fashioned side-eye.
Key Points:
- Elusive Comet exploits Zoom’s remote control feature in crafty social engineering attacks.
- Their tactics echo those of the infamous Lazarus group linked to the Bybit crypto heist.
- Attackers pose as Bloomberg journalists to lure high-value targets into fake Zoom interviews.
- Their display name trickery makes victims think it’s Zoom itself asking for remote control.
- Trail of Bits suggests ditching Zoom for security-critical environments to dodge these scams.