North Korean hackers use AI deepfake Zoom to scam, cryptocurrency companies face dual attack of targeted "social engineering + Trojan"

February 11 News, Google’s security team Mandiant disclosed that a North Korea-linked hacker group is using deepfake videos and fake Zoom calls to carry out highly targeted social engineering attacks against the cryptocurrency industry, and is deploying multiple malicious programs to steal assets and data.

The investigation shows that this operation was launched by the cyber threat group UNC1069. The group has been active since at least 2018 and shifted its focus from traditional finance to the Web3 space after 2023, targeting executives of crypto financial technology companies, software developers, and venture capital professionals. The incident began when an industry executive’s Telegram account was hijacked. The attacker impersonated the individual to contact targets, build trust, and then send fake Calendly video meeting invitations.

After victims clicked the link, they were directed to a fake Zoom domain controlled by the attacker. During the call, the attacker played a deepfake video of what appeared to be the CEO of another crypto company, and claimed there was an “audio malfunction,” tricking the target into running a supposed troubleshooting command on their computer. These commands triggered an infection chain on macOS and Windows systems, silently deploying up to seven malicious software programs.

Mandiant confirmed that these tools can steal Keychain credentials, browser cookies, login information, Telegram sessions, and local sensitive files. Researchers believe that the attackers aim both to directly acquire crypto assets and to gather intelligence for future scams. Deploying so many tools on a single device indicates a carefully planned targeted infiltration.

This incident is not isolated. By 2025, similar AI conference scams had caused losses exceeding $300 million; throughout the year, cyber operations related to North Korea stole approximately $2.02 billion in digital assets, a 51% increase. Chainalysis also pointed out that scam groups utilizing on-chain AI services are significantly more efficient than traditional methods.

As the barrier to deepfake technology continues to lower, the crypto industry faces unprecedented security challenges. Experts warn that online meetings involving funds and system permissions must strengthen multi-factor authentication and device isolation; otherwise, they could become the next attack vector.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Jack Dorsey posted to confirm that Apple has removed Bitchat, the decentralized messaging software, at China’s request.

Block CEO Jack Dorsey confirmed that Apple has removed the decentralized communications app Bitchat in accordance with China’s requirements because it violates China’s Cybersecurity Law. Bitchat uses Bluetooth and a mesh network for communication and does not rely on the internet, which is why it has been widely used in protests. The app can still be used in other countries, and the global download count has exceeded 3 million.

ChainNewsAbmedia1h ago

Resolv Labs destroys 36.73 million USR tokens held by the hacker by upgrading the contract

Resolv Labs destroyed 36.73 million USR tokens held by the hacker via a contract upgrade. Previously, the hacker had minted 80 million USR tokens through a vulnerability and sold them off. The project team has since burned about 46 million USR tokens, and the actual loss was $34 million.

GateNews2h ago

Drift says $270 million exploit was a six-month North Korean intelligence operation

A six-month intelligence operation preceded the $270 million exploit of Drift Protocol and was carried out by a North Korean state-affiliated group, according to a detailed incident update published by the team earlier on Sunday. The attackers first made contact around fall 2025 at a major crypto c

CoinDesk3h ago

BTQ Technologies releases quantum bitcoin mining research: actual costs are extremely high, and the real risk lies in a signature vulnerability

BTQ Technologies publishes a research paper assessing the physical costs of quantum computing in Bitcoin mining, emphasizing that Bitcoin’s main risk comes from vulnerabilities in cryptographic signatures rather than quantum mining. The study proposes an open-source resource estimation model that covers key computational steps.

GateNews4h ago

Denaria Suffers a Smart Contract Attack, Losing About $165,000

A decentralized perpetual contract trading platform Denaria announced that its smart contract was attacked, resulting in a loss of about $165k. The team is investigating with the auditors and has suspended the user interface while preparing a refund process. Denaria hopes to avoid legal action by inviting the attacker to contact them through a bounty program.

GateNews5h ago

XRPL Validator Sounds Alarm to XRP Users on Social Engineering Threat - U.Today

XRP Ledger validator Vet warns the XRP community after a social engineering scam drained $280 million from Solana's Drift Protocol, highlighting the need for caution and vigilance among builders in light of increasing crypto vulnerabilities.

UToday7h ago
Comment
0/400
00001clvip
· 02-11 10:37
Purely a mafia!
View OriginalReply0