Security researchers at Trail of Bits have identified a threat actor, ELUSIVE COMET, launching a social engineering campaign abusing Zoom’s remote control feature to take control of victims’ computers and install malware. The attack impersonate the Zoom tech support to install malware, exfiltrate data or commit cryptocurrency theft. The same tactic could be deployed across many other remote meeting platforms.

North Korean Hackers Use Fake U.S. Companies to Spread Malware in Crypto Industry: Report
North Korean hackers reportedly set up shell companies in the US to penetrate the crypto sector and target developers via fake job offers, according to