'Elusive Comet' Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect a victim's device, either with an infostealer or remote access Trojan (RAT).

Apr 21, 2025 - 23:01
 0
'Elusive Comet' Attackers Use Zoom to Swindle Victims
The threat actor uses sophisticated social engineering techniques to infect a victim's device, either with an infostealer or remote access Trojan (RAT).