Found 1 bookmarks
Custom sorting
Mitigating ELUSIVE COMET Zoom remote control attacks - The Trail of Bits Blog
Mitigating ELUSIVE COMET Zoom remote control attacks - The Trail of Bits Blog
When our CEO received an invitation to appear on “Bloomberg Crypto,” he immediately recognized the hallmarks of a sophisticated social engineering campaign. What appeared to be a legitimate media opportunity was, in fact, the latest operation by ELUSIVE COMET—a threat actor responsible for millions in cryptocurrency theft through carefully constructed social engineering attacks. This post details our encounter with ELUSIVE COMET, explains their attack methodology targeting the Zoom remote control feature, and provides concrete defensive measures organizations can implement to protect themselves.
·blog.trailofbits.com·
Mitigating ELUSIVE COMET Zoom remote control attacks - The Trail of Bits Blog