The Zoom attack you didn’t see coming

Summary: A recent tactic involves threat actors using Zoom’s remote control feature to install malware on victims’ computers. Known as ELUSIVE COMET, this group targets individuals by inviting them to Zoom calls under false pretenses, leading to accidental sharing of access. Users are cautioned to be vigilant with remote control permissions during online meetings to avoid falling victim to similar scams.

Affected: Zoom users and organizations, particularly in cryptocurrency and decentralized finance sectors.

Keypoints :

  • ELUSIVE COMET uses Zoom calls to trick users into granting remote access to their devices.
  • Attackers impersonate legitimate entities and use polished online profiles to establish credibility.
  • Users should disallow the remote control option in Zoom settings to mitigate risks.
  • Threats are evolving to target human behavior rather than relying solely on technical vulnerabilities.

Source: https://www.helpnetsecurity.com/2025/04/18/zoom-remote-control-attack/