Hackers Leverage Zoom’s Remote Control Feature to Gain Access to the Victim’s Computer

A sophisticated attack campaign by threat actor ELUSIVE COMET that exploits Zoom’s legitimate remote control feature to gain unauthorized access to victims’ computers.  The attackers have successfully targeted cryptocurrency professionals using a combination of social engineering and interface manipulation techniques, resulting in millions in cryptocurrency theft. Multi-Stage Attack Leveraging Social Media and Zoom Vulnerabilities The […]

The post Hackers Leverage Zoom’s Remote Control Feature to Gain Access to the Victim’s Computer appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: