Zoom: A Conduit for Malware – How to Safeguard Your Computer?

Learn how hackers use Zoom to deploy malware and hijack computers, and find out our tips for safeguarding your device and maintaining online security.
Zoom: A Hidden Threat
The Security Alliance has issued a security alert for Zoom users, particularly those with high-profile accounts. A new cybercriminal group, dubbed ELUSIVE COMET, also known as Aureon Capital, Aureon Press, and The OnChain Podcast, is exploiting the videoconferencing platform to deceive users and deploy malware.
A Crafty Scam
This group has meticulously crafted false narratives and account histories to lure victims into accepting their requests. They operate behind active social media accounts that impersonate real individuals with legitimate credentials and well-designed websites.
Once the malware is installed, they can steal cryptocurrency wallet funds, take over accounts, and seize other assets. They typically entice their victims by offering media opportunities, then schedule a Zoom meeting.
How the Scam Unfolds
During the Zoom call, they keep their screens off and subsequently send a remote control request under the changed screen name ‘Zoom’. This makes it appear as though the application itself is requesting system control. Busy, distracted, or less tech-savvy individuals might perceive this as a legitimate request and accept it, granting the attacker complete control over their system.
How to Protect Yourself
It is advised to avoid accepting Zoom calls from unknown individuals and to completely disable the remote control feature. Using Zoom’s browser version, which limits functionalities including remote system control, is also recommended. Lastly, the Security Alliance urges users to exercise due diligence when approached with offers or requests from strangers to ensure they are interacting with legitimate profiles.