Posted on

The Zoom Call That Stole $100,000: How Social Engineering Bypasses Technical Defenses

Technical vulnerabilities get patched. Software can be updated. But there is no patch for human trust. That’s why social engineering remains one of the most effective attack vectors in cybersecurity today. A recent case illustrates just how devastating these attacks can be—and why every organization should treat them as seriously as malware or ransomware.

How the Attack Worked

The victim was invited to what appeared to be a legitimate partnership call. The attacker used weeks of preparation—casual conversation, professional knowledge, and even a referral chain—to establish credibility. When the call began, everything looked normal: cameras on, introductions exchanged, polite banter while waiting for “colleagues.”

Then came the pivot. The attacker, claiming VPN issues, suggested switching to a different meeting link. Once the victim clicked, a prompt appeared to “update the Zoom SDK” in order to enable audio or video. The update was not an installer at all, but a disguised script. Running it installed malware designed to:

  • Drain cryptocurrencies from hot wallets.
  • Hijack active browser sessions and bypass 2FA.
  • Compromise connected accounts, including social media.

Within seconds of execution, funds were being sold and accounts taken over.

Why It Worked

Unlike traditional phishing, this attack relied on trust, patience, and pressure:

  • Trust: The attacker came through a referral and engaged over several weeks, lowering suspicion.
  • Patience: Nothing was rushed. Every step felt like normal business practice.
  • Pressure: By positioning themselves as the meeting host with others waiting, the attacker created subtle urgency to “just join quickly.”

The exploit was not in Zoom or the victim’s wallet—it was in the human interaction itself.

Key Lessons

  1. Never install software during a live meeting. Real platforms will never require you to update through a third-party prompt mid-call.
  2. Control the meeting environment. If you host the call, stay on your platform. Do not switch links because of “connection issues.”
  3. Separate devices for sensitive assets. Keep crypto wallets and critical accounts on a machine isolated from daily communications.
  4. Use hardware wallets. Even if a hot wallet is compromised, hardware wallets require physical confirmation for every transaction.
  5. Expect the slow burn. Not all scams are rushed. The most convincing attacks are the ones that feel normal, friendly, and even professional.

The Bigger Picture

Social engineering attacks like this remind us that cybersecurity is not just about firewalls and patches. It’s about people. Training, awareness, and skepticism are the first line of defense. The adversary is not always a faceless hacker in code—it may be the person smiling at you over video

Matt Rosenthal Headshot
Learn More About Matt

Matt Rosenthal is CEO and President of Mindcore, a full-service tech firm. He is a leader in the field of cyber security, designing and implementing highly secure systems to protect clients from cyber threats and data breaches. He is an expert in cloud solutions, helping businesses to scale and improve efficiency.

Related Posts