North Korean hackers use AI deepfake Zoom to scam, cryptocurrency companies face dual attack of targeted "social engineering + Trojan"

February 11 News, Google’s security team Mandiant disclosed that a North Korea-linked hacker group is using deepfake videos and fake Zoom calls to carry out highly targeted social engineering attacks against the cryptocurrency industry, and is deploying multiple malicious programs to steal assets and data.

The investigation shows that this operation was launched by the cyber threat group UNC1069. The group has been active since at least 2018 and shifted its focus from traditional finance to the Web3 space after 2023, targeting executives of crypto financial technology companies, software developers, and venture capital professionals. The incident began when an industry executive’s Telegram account was hijacked. The attacker impersonated the individual to contact targets, build trust, and then send fake Calendly video meeting invitations.

After victims clicked the link, they were directed to a fake Zoom domain controlled by the attacker. During the call, the attacker played a deepfake video of what appeared to be the CEO of another crypto company, and claimed there was an “audio malfunction,” tricking the target into running a supposed troubleshooting command on their computer. These commands triggered an infection chain on macOS and Windows systems, silently deploying up to seven malicious software programs.

Mandiant confirmed that these tools can steal Keychain credentials, browser cookies, login information, Telegram sessions, and local sensitive files. Researchers believe that the attackers aim both to directly acquire crypto assets and to gather intelligence for future scams. Deploying so many tools on a single device indicates a carefully planned targeted infiltration.

This incident is not isolated. By 2025, similar AI conference scams had caused losses exceeding $300 million; throughout the year, cyber operations related to North Korea stole approximately $2.02 billion in digital assets, a 51% increase. Chainalysis also pointed out that scam groups utilizing on-chain AI services are significantly more efficient than traditional methods.

As the barrier to deepfake technology continues to lower, the crypto industry faces unprecedented security challenges. Experts warn that online meetings involving funds and system permissions must strengthen multi-factor authentication and device isolation; otherwise, they could become the next attack vector.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Phantom Wallet Crashes Big Time! During the Airdrop Period, Token Prices Get Thrown Off, Balances Go to Zero—Users Blast the “Losses”

Phantom, a wallet in the Solana ecosystem, experienced a service outage during the airdrop, causing abnormal token price and account balance displays and affecting users’ transactions. Some users therefore incurred losses and are demanding compensation. Security experts warn of the risk of phishing attacks and advise users to verify on-chain data. Although the issue has been fixed, the trust crisis still needs to be monitored. This incident highlights the challenges self-custody wallets face in terms of system stability and user experience.

区块客44m ago

Circle Responds to the Drift Protocol Hack: USDC Freezing Must Be Executed Legally, Urges Faster Crypto Legislation

Circle’s Chief Strategy Officer Dante Disparte responded to the Drift Protocol theft incident, emphasizing that freezing USDC is being carried out according to law, calling for stronger coordination between law and technology, and suggesting that DeFi protocols should draw on protection mechanisms from traditional markets to advance legal protection of property rights and financial privacy.

GateNews1h ago

Aethir prevents cross-chain bridge exploit attacks, losses controlled at $90k, and commits to compensate

Decentralized GPU cloud computing platform Aethir confirmed that its Ethereum bridge contract was attacked, with losses kept within $90k. The team promptly disconnected the contract and worked with exchanges to deal with the hacker wallets. The attacker used a cross-chain smart contract to move funds. Aethir plans to announce a compensation plan next week, and revenue is expected to reach $127.8 million in 2025.

GateNews2h ago

Bitcoin Depot Discloses $3.6M BTC Theft After Hack on Settlement Accounts

Bitcoin Depot reported a security breach where hackers stole 50.9 BTC, worth approximately $3.6 million, by compromising internal settlement account credentials. This incident highlights vulnerabilities in crypto companies' operational infrastructure, emphasizing the need for enhanced security measures.

CryptoNewsFlash5h ago

Aethir Successfully Thwarts an ATH Token Cross-Chain Bridge Attack, with User Losses Below $90k

Aethir issued a security advisory on April 10, confirming that it successfully blocked a malicious attack on the ATH token cross-chain bridge contract, with losses under $90k. All affected contracts have been disconnected, and the core circulating supply remains intact. Aethir will work with trading platforms and law enforcement agencies to support the freezing of funds and the identification and tracking of the attacker, and it will publish investigation updates and a compensation plan in its Discord community.

GateNews6h ago

Claude code leak sparks an LLM crisis, hackers have stolen researchers’ ETH

Security research reveals that in the LLM agent ecosystem, over 20% of free API routers actively inject malicious code, leading to asset theft and credential crises. In addition, the Claude code-leak incident has enabled attackers to spread malware by exploiting developers’ curiosity. The research team proposes a three-layer defense mechanism to address supply-chain security risks.

MarketWhisper7h ago
Comment
0/400
00001clvip
· 02-11 10:37
Purely a mafia!
View OriginalReply0