Cybersecurity is increasingly under threat as hackers develop new methods to infiltrate computers and steal valuable assets. A recent scam, which has gained traction, employs a deceptive Zoom call to compromise users’ systems and pilfer their cryptocurrency. This scam, referred to as “Elusive Comet,” might seem straightforward to avoid, but the execution by attackers is remarkably meticulous. Although the primary aim is to raid crypto wallets, the attack could have broader malicious implications.
Victims are often chosen based on their notoriety, with hackers posing as representatives from well-known media organizations to lure them into a Zoom discussion. Once the victim agrees to the call, the hacker sends an invitation through Calendly. Upon clicking the invite, a pop-up message appears stating, “Zoom is requesting remote control of your screen.” For many, this alert could easily be overlooked, masking a significant threat akin to a glaring warning sign to prospective victims. Researchers from the cybersecurity firm Trail of Bits have highlighted the inherent danger in this attack, primarily due to the familiarity of the permission dialog compared to legitimate Zoom notifications.
Most users, unaware that granting remote access is a significant security risk, unwittingly comply, allowing the hacker to infiltrate their systems and specifically target their cryptocurrency holdings. What heightens the threat is that attackers often install malware to maintain their backdoor access. While they primarily focus on cryptocurrency wallets, they can also access other sensitive information stored on the user’s computer. This level of intrusion can profoundly disrupt a victim’s life.
Consequently, it is crucial to exercise vigilance in online communications and refrain from granting unnecessary permissions to applications.