Security Stop-Press: Hackers Exploit Zoom Remote Control to Hijack Devices

April 30, 2025

Security Stop-Press: Hackers Exploit Zoom Remote Control to Hijack Devices

A new cyber campaign is exploiting Zoom’s remote control feature to install malware, exfiltrate data, and hijack victim devices, researchers have warned.

The attack, linked to a threat group called Elusive Comet, tricks users into granting remote access during fake Zoom interviews arranged via bogus Calendly links and spoofed Bloomberg emails. Once on the call, attackers rename themselves “Zoom” to make their remote control request look like a harmless system notification.

Trail of Bits, who uncovered the attack, warned that “users habituated to clicking ‘Approve’ on Zoom prompts may grant complete control of their computer without realising the implications.” This method bypasses technical vulnerabilities and instead relies on exploiting normal user behaviour and trust in legitimate platforms.

Security experts say the incident highlights the growing threat of ‘living off trusted services’ (LOTS) attacks, with Mimecast noting over five billion such threats were flagged in late 2024 alone. Using Zoom and Calendly links makes these attacks harder to detect and block.

Businesses can protect themselves by blocking Zoom’s remote control permissions, encouraging browser-based meeting tools like Google Meet, hardening authentication with security keys, and training staff to spot suspicious activity during video calls.

Featured Article : ChatGPT Now Records & Can Access Your Files
June 11, 2025
ChatGPT now includes meeting recording, cloud integration and deep research tools, marking its biggest push yet into everyday business workflows.
Tech Insight : Microsoft Deleting Saved Passwords From Auth App
June 11, 2025
Microsoft is warning users that saved passwords will soon be deleted from its Authenticator app, as it phases out the feature in favour of Edge and passkeys.
More Posts