Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems of cryptocurrency traders and venture capitalists. Named “Elusive Comet,” this campaign employs sophisticated social engineering tactics to trick users into granting remote access during Zoom meetings, leading to the deployment of infostealer malware and unauthorized access to sensitive data.

How the Attack Works

Zoom’s remote control feature, designed to allow meeting participants to share control of another user’s computer during a session, is at the heart of this exploit. The attack unfolds in four deceptive steps:

  1. Legitimate-Looking Meeting Setup: Attackers schedule a seemingly authentic business call, often posing as trusted contacts or colleagues.
  2. Remote Control Request: During screen-sharing, the hacker requests remote control access, a common feature in collaborative Zoom meetings.
  3. Display Name Trickery: The attacker changes their Zoom display name to “Zoom,” making the permission prompt appear as a routine system notification.
  4. Malware Installation: Once access is granted, the attacker can install malware, steal private keys, or exfiltrate sensitive data, often implanting a stealthy backdoor for persistent access.

What makes this attack particularly insidious is the permission dialog’s similarity to harmless Zoom notifications. Users conditioned to approve routine prompts may unwittingly hand over complete control of their systems.

Why This Matters

The Elusive Comet campaign underscores a shift in cybercrime toward human-centric attacks that manipulate legitimate workflows rather than exploiting technical vulnerabilities. This approach, also seen in the Bybit hack linked to North Korean hackers, exploits user trust and familiarity with tools like Zoom. For organizations and individuals handling cryptocurrency or sensitive data, the stakes are high, and attackers can drain wallets or compromise entire systems in seconds.

How to Protect Yourself

To safeguard against this threat, consider the following measures:

  • Disable Remote Control: Zoom administrators can disable the remote control feature at the account, group, or user level. For high-security environments, lock this setting to prevent accidental enabling.
  • Use Browser-Based Zoom: Trail of Bits recommends removing the Zoom desktop client entirely, especially for systems handling valuable digital assets. Browser-based Zoom avoids vulnerabilities tied to accessibility permissions.
  • Implement PPPC Profiles: On macOS, deploy Privacy Preferences Policy Control (PPPC) profiles to block Zoom’s accessibility access, closing the attack vector without disrupting video conferencing functionality.
  • Stay Vigilant: Be cautious of unsolicited meeting invites or remote control requests, even from familiar contacts. Verify identities through secondary channels before granting access.
  • Update Zoom Regularly: Ensure you are running the latest version of Zoom to benefit from security patches addressing known vulnerabilities.

The Bigger Picture

This exploit is a wake-up call for the cybersecurity community. As remote collaboration tools become ubiquitous, attackers are increasingly targeting user behavior rather than software flaws. The blockchain industry faces heightened risks as operational security failures outpace technical vulnerabilities. Organizations must prioritize user training, robust access controls, and proactive threat monitoring to stay ahead of sophisticated threat actors like Elusive Comet.

Conclusion

The Zoom remote control exploit is a stark reminder that even trusted tools can be weaponized in the wrong hands, and it’s only a matter of time before such attacks target regular computer users. By disabling risky features, adopting browser-based alternatives, and fostering a culture of cybersecurity awareness, individuals and organizations can mitigate these threats. Stay informed, stay cautious, and keep your systems secure.

Secure your business with CyberHoot Today!!!

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.