Zoom Remote Control Feature Exploited to Access Victims’ Computers—with Permission

A new wave of sophisticated cyberattacks has emerged, targeting organizations through a blend of social engineering and software feature abuse.

The threat actor known as ELUSIVE COMET has been linked to millions in cryptocurrency theft, exploiting Zoom’s remote control feature to gain unauthorized access to victims’ computers during seemingly legitimate business calls.

Attack Methodology: Social Engineering Meets Software Features

ELUSIVE COMET’s attacks begin with carefully crafted social engineering. For example, the CEO of Trail of Bits was approached by Twitter accounts posing as Bloomberg Crypto producers.

The attackers avoided official communication channels, using Calendly pages that were not affiliated with Bloomberg, and insisted on scheduling via unofficial links.

The technical core of the attack leverages Zoom’s remote control feature. During a business call, the attacker requests remote control access while screen sharing.

Critically, they change their display name to “Zoom,” making the request appear as a benign system notification.

If the victim, distracted by the meeting, clicks “Approve,” the attacker gains full control of the computer, enabling them to install malware, exfiltrate sensitive data, or steal cryptocurrency.

Why the Attack Succeeds

  • Legitimate Context: The attack occurs during normal business workflows.
  • Interface Ambiguity: The Zoom permission dialog does not communicate the risk.
  • User Habituation: Users are accustomed to approving Zoom prompts.
  • Divided Attention: Victims are focused on the meeting, not security.

This approach exploits operational security weaknesses rather than traditional software vulnerabilities.

Technical Defenses: Layered Security Approach

Trail of Bits responded with a multilayered defense strategy, combining technical controls and operational policies.

Endpoint Protection

  • Deployed CrowdStrike Falcon Complete with aggressive machine learning (ML) prevention settings for real-time behavioral detection.
  • Enforced mandatory upgrades to the latest macOS versions to minimize attack surfaces.

Authentication Hardening

  • Required hardware security keys (YubiKey) for all Google Workspace accounts, eliminating weaker authentication methods like TOTP or SMS.
  • Used Google SSO for unified phishing resistance.

Password Management

  • Company-wide deployment of Password with browser extensions that prevent autofill on suspicious domains, forcing users to consciously enter credentials on unfamiliar sites.

Communication Platform Choices

  • Preferred Google Meet over Zoom due to its browser-based security model, which restricts system resource access compared to native applications.

Restrictive Application Controls

  • Zoom is wrapped with additional security controls and regularly removed from systems when not needed.
  • The remote control feature is specifically disabled by blocking accessibility permissions at the macOS system level.

Mitigation Tools and Scripts

Script NamePurposeExecution FrequencyTarget Scope
create_zoom_pppc_profile.bashCreates system-wide PPPC profiles to block accessibilityOnce per computerAll computers
disable_zoom_accessibility.bashUninstalls Zoom completely from the systemsEvery 15 minutesComputers with Zoom installed
uninstall_zoom.bashUninstalls Zoom completely from systemsWeeklyComputers with Zoom installed

Technical Terms Explained:

  • PPPC (Privacy Preferences Policy Control) Profile: A macOS configuration profile that manages app permissions, such as accessibility access, at the system level.
  • TCC (Transparency, Consent, and Control) Database: The macOS subsystem that tracks and enforces user consent for app permissions.
  • Accessibility Permissions: Special OS-level privileges required for remote control features; blocking these disables Zoom’s remote control capability.

Sample Bash Command to Remove Zoom Accessibility:

bashsudo sqlite3 /Library/Application\ Support/com.apple.TCC/TCC.db "DELETE FROM access WHERE client='us.zoom.xos';"

This command removes existing accessibility permissions for Zoom from the TCC database.

Additional Recommendations

  • Train staff to recognize social engineering attempts, especially unusual permission requests during video calls.
  • Monitor for indicators of compromise (IoCs), such as suspicious Zoom URLs or unauthorized Calendly links.
  • Enforce communication policies that require verification of external contacts through official channels.
  • Implement DMARC, SPF, and DKIM for email boundary protection.

The ELUSIVE COMET campaign highlights the growing threat of operational security failures, where human factors and legitimate software features are manipulated to bypass technical defenses.

Combining technical controls—such as PPPC profiles and TCC monitoring—with robust operational policies, organizations can effectively mitigate these evolving attack vectors without sacrificing business productivity.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here