Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Rising argan oil demand strains Morocco’s rural economy and forests

July 28, 2025

Age-related cognitive decline can be slowed by eating healthy and exercising your body and brain

July 28, 2025

Crème fraîche creates a creamy broth in a briny-sweet steamed clams recipe

July 28, 2025
Facebook X (Twitter) Instagram
Trending
  • Rising argan oil demand strains Morocco’s rural economy and forests
  • Age-related cognitive decline can be slowed by eating healthy and exercising your body and brain
  • Crème fraîche creates a creamy broth in a briny-sweet steamed clams recipe
  • South Korean beauty products could be subject to steep tariffs
  • What to Stream: Reneé Rapp, Anthony Mackie and Jason Momoa
  • Trump calls for DC to restore old NFL name as experts say Native mascots cause harm
  • The Founder Of Shake Shack Is Now A Billionaire
  • What to know about the dating app Tea and its hacked data
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Tuesday, July 29
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature
Cybersecurity

North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature

adminBy adminApril 21, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 49


North Korean cryptocurrency thieves are quietly repurposing a little‑known Zoom Remote collaboration feature to plant infostealer malware on the workstations of cryptocurrency traders and venture investors.

According to separate advisories from the non‑profit Security Alliance (SEAL) and cybersecurity research firm Trail of Bits, Pyongyang hackers posing as VC investors have been caught sending phishing lures with Calendly links to Zoom meetings.

The campaign, tracked by SEAL as Elusive Comet, begins with a standard press‑relations pitch or a direct message inviting the target to appear on a podcast run by Aureon Capital.

If the victim takes the podcast appearance bait, the hackers schedule a call over Zoom to learn more about the potential victim’s work, sometimes withholding meeting details until the very last minute in order to induce additional urgency.

“Once the potential victim has joined the call, they are prompted to share their screen to present their work. At this point, [the hackers] will use Zoom to request control over the potential victim’s computer. If the potential victim is not paying close attention, they may accidentally grant remote access, which allows Elusive Comet to install their malware to the victim’s device,” according to the SEAL alert.

The alliance said the malware is capable of acting as an infostealer that  immediately exfiltrates relevant secrets, or a RAT (remote access trojan) that allows for exfiltration at a later time.

The Zoom Remote Control feature allows one computer user to  take control of another participant’s screen in a meeting when they’ve given explicit permission.  

In the observed attacks, the hackers change their display name to “Zoom” that masks a permission dialog from another participant into what looks like an innocuous system pop‑up. 

Advertisement. Scroll to continue reading.

One hasty click gives the intruder full mouse‑and‑keyboard access, after which a malware installer (SEAL has spotted both data‑dumping loaders and full remote‑access Trojans) lands and begins trawling browser sessions, password managers and seed phrases. 

SEAL’s incident log attributes “millions of dollars” in losses to the operation and lists nearly thirty sock‑puppet social‑media accounts and a handful of slick corporate websites used to give the fake Aureon Capital an air of legitimacy. 

Cybersecurity consulting firm Trail of Bits said it encountered the ruse first-hand when two X social media profiles posing as Bloomberg producers tried to book the company’s chief executive for a “Crypto” segment. 

Trail of Bits said the threat actor refused to switch to email, pushed late‑breaking meeting links and supplied Zoom URLs that, on inspection, belonged to consumer‑grade accounts rather than Bloomberg’s enterprise tenant. 

In a blog post documenting the case, Trail of Bits said a successful exploit hinges on Zoom’s reliance on macOS “accessibility” permissions and a “simple yet effective social engineering” four-step trickery:

The attacker schedules a seemingly legitimate business call.

During screen sharing, they request remote control access.

They change their display name to “Zoom” to make the request appear as a system notification.

If granted access, they can install malware, exfiltrate data, or conduct  

Zoom’s documentation makes clear that Remote Control was never meant for unsupervised administration; it is an “in‑meeting” convenience that any host can disable at the account, group or user level. Administrators can also lock the setting and remove the clipboard‑sharing option that attackers exploit to shuttle private keys between machines. 

However, in practice,  the toggle remains on by default for many corporate tenants, and the permission dialog offers no visual cue that the request is anything other than a routine Zoom process. 

Trail of Bits argues this interface ambiguity is the exploit’s real power: security‑savvy professionals who would balk at a traditional remote‑desktop prompt seldom recognize the risk in a familiar collaboration tool.  

“What makes this attack particularly dangerous is the permission dialog’s similarity to other harmless Zoom notifications. Users habituated to clicking “Approve” on Zoom prompts may grant complete control of their computer without realizing the implications,” Trail of Bits warned.

The company said the observed methodology mirrors the techniques behind the recent $1.5 billion Bybit hack in February, where attackers manipulated legitimate workflows rather than exploiting code vulnerabilities. 

“This reinforces our perspective that the blockchain industry has entered the era of operational security failures, where human-centric attacks now pose greater risks than technical vulnerabilities,” the company added.

Trail of Bits said its security team has marked the Zoom remote control feature as “an unnecessary risk” and deployed technical controls to prevent it from functioning on its computer systems. 

“By specifically targeting the accessibility permissions that enable remote control, we close the attack vector that Elusive Comet exploits without disrupting legitimate videoconferencing functionality,” Trail of Bits said.

Related: FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge

Related: $1.5 Billion Bybit Heist Linked to North Korean Hackers

Related: Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange

Related: Lazarus Uses ClickFix Tactics in Fake Cryptocurrency Job Attacks



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

The Founder Of Shake Shack Is Now A Billionaire

July 26, 2025

Todd Williamson/Getty Images for Airbnb Danny Meyer made his name opening up a string of…

‘South Park’ Creators Trey Parker and Matt Stone Are Now Billionaires

July 25, 2025

How Jeffrey Epstein Got So Rich

July 25, 2025

Vanta Raises Funds At $4 Billion Valuation—Despite Not Needing Cash

July 23, 2025
Our Picks

Rising argan oil demand strains Morocco’s rural economy and forests

July 28, 2025

Age-related cognitive decline can be slowed by eating healthy and exercising your body and brain

July 28, 2025

Crème fraîche creates a creamy broth in a briny-sweet steamed clams recipe

July 28, 2025

South Korean beauty products could be subject to steep tariffs

July 28, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.