A sophisticated attack campaign by threat actor ELUSIVE COMET that exploits Zoom’s legitimate remote control feature to gain unauthorized access to victims’ computers. The attackers have successfully targeted cryptocurrency professionals using a combination of social engineering and interface manipulation techniques, resulting in millions in cryptocurrency theft. Multi-Stage Attack Leveraging Social Media and Zoom Vulnerabilities The […]
The post Hackers Leverage Zoom’s Remote Control Feature to Gain Access to the Victim’s Computer appeared first on Cyber Security News.
This article has been indexed from Cyber Security News