North Korean hackers use AI deepfake Zoom to scam, cryptocurrency companies face dual attack of targeted "social engineering + Trojan"

February 11 News, Google’s security team Mandiant disclosed that a North Korea-linked hacker group is using deepfake videos and fake Zoom calls to carry out highly targeted social engineering attacks against the cryptocurrency industry, and is deploying multiple malicious programs to steal assets and data.

The investigation shows that this operation was launched by the cyber threat group UNC1069. The group has been active since at least 2018 and shifted its focus from traditional finance to the Web3 space after 2023, targeting executives of crypto financial technology companies, software developers, and venture capital professionals. The incident began when an industry executive’s Telegram account was hijacked. The attacker impersonated the individual to contact targets, build trust, and then send fake Calendly video meeting invitations.

After victims clicked the link, they were directed to a fake Zoom domain controlled by the attacker. During the call, the attacker played a deepfake video of what appeared to be the CEO of another crypto company, and claimed there was an “audio malfunction,” tricking the target into running a supposed troubleshooting command on their computer. These commands triggered an infection chain on macOS and Windows systems, silently deploying up to seven malicious software programs.

Mandiant confirmed that these tools can steal Keychain credentials, browser cookies, login information, Telegram sessions, and local sensitive files. Researchers believe that the attackers aim both to directly acquire crypto assets and to gather intelligence for future scams. Deploying so many tools on a single device indicates a carefully planned targeted infiltration.

This incident is not isolated. By 2025, similar AI conference scams had caused losses exceeding $300 million; throughout the year, cyber operations related to North Korea stole approximately $2.02 billion in digital assets, a 51% increase. Chainalysis also pointed out that scam groups utilizing on-chain AI services are significantly more efficient than traditional methods.

As the barrier to deepfake technology continues to lower, the crypto industry faces unprecedented security challenges. Experts warn that online meetings involving funds and system permissions must strengthen multi-factor authentication and device isolation; otherwise, they could become the next attack vector.

View Original
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

OpenAI and Paradigm launch EVMbench to explore the application of AI Agents in the security of smart contracts

OpenAI and Paradigm collaborate to launch EVMbench, aimed at evaluating AI Agents' capabilities in smart contract security, including vulnerability detection and patching. The tool addresses recent vulnerability attacks on DeFi protocols, promoting the application and testing of AI in the field of code security.

GateNewsBot26m ago

Shiba Inu Exec Issues Critical Warning as Scammers Appear Again - U.Today

Lucie, a Shiba Inu executive, warned users about scammers exploiting the SHIB community with fake portals related to the new SOU NFT project. She urged users to verify links and only use the official website to prevent wallet theft. The SOU initiative aims to compensate users affected by a previous exploit, offering audited NFTs that document owed tokens.

UToday7h ago

Moonwell releases official statement on oracle mismatch incident; the fix governance proposal is scheduled to go live.

DeFi lending protocol Moonwell incurred approximately $1.78 million in bad debt due to an oracle configuration error, causing the cbETH quote to deviate from the actual market price. Attackers easily liquidated debts, resulting in a large number of borrowers' assets being wiped out. The fix requires a five-day governance vote, and a repair proposal is currently planned to go live.

GateNewsBot9h ago

Moonwell lost $1.78 million due to a contract error caused by AI Claude Opus 4.6, co-authored by

A serious security incident occurred on Moonwell's DeFi lending protocol due to a critical vulnerability in smart contract code allegedly written by AI model Claude Opus 4.6, resulting in a $1.78 million exploit. The issue stemmed from incorrect pricing of cbETH, allowing manipulation of the system.

TapChiBitcoin18h ago

A certain trader suffered a poisoning attack resulting in a loss of approximately $600,000 worth of USDT.

PANews February 17 News, according to Cyvers Alerts monitoring, a trader experienced a poisoning attack about an hour ago, resulting in a loss of approximately $600,000 worth of USDT. When attempting to send funds to 0x77f6ca8E...2E087a346, he mistakenly sent the transaction to a malicious impersonation address 0x77f6A6F6...DFdA8A346, warning users to be vigilant about related risks.

GateNewsBot02-17 07:37
Comment
0/400
00001clvip
· 02-11 10:37
Purely a mafia!
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)