The Zoom attack you didn't see coming
a year ago
- #Phishing Attacks
- #Zoom Security
- #Cybersecurity
- Zoom calls allow participants to remotely control your computer, a feature exploited by threat actors like ELUSIVE COMET.
- ELUSIVE COMET impersonates legitimate entities, luring victims via social media or email to join Zoom calls under false pretenses.
- During calls, attackers request remote control by disguising prompts as system notifications, leading to malware installation.
- Victims, including high-profile individuals, have suffered significant financial losses and account compromises.
- Security experts recommend disabling remote control in Zoom settings or removing Zoom entirely for high-security environments.
- This attack highlights the shift towards exploiting human vulnerabilities rather than technical flaws.