The post North Korea Linked Hackers Behind Surge in Zoom Scam Attacks appeared on BitcoinEthereumNews.com. This method already drained more than $300 million fromThe post North Korea Linked Hackers Behind Surge in Zoom Scam Attacks appeared on BitcoinEthereumNews.com. This method already drained more than $300 million from

North Korea Linked Hackers Behind Surge in Zoom Scam Attacks

2025/12/15 16:56

This method already drained more than $300 million from crypto users by exploiting trust on platforms like Telegram. At the same time, Ethereum developers disclosed that a previously undetected Prysm bug introduced ahead of the Fusaka upgrade caused a temporary validation slowdown on Dec. 4, leading to missed slots and lost rewards but stopped short of a loss of finality. While both incidents were ultimately contained, they prove that there are still a number of concerning threats to crypto security.

Fake Zoom Meeting Scams Drain Crypto Users

Cybersecurity nonprofit Security Alliance (SEAL) issued a fresh warning after detecting multiple daily scam attempts linked to North Korean hacking groups that rely on fake Zoom meetings to compromise victims. According to SEAL and security researcher Taylor Monahan, the campaign already resulted in more than $300 million in stolen funds, with crypto users, developers, and protocol teams among the main targets.

The scam typically begins on Telegram, where a victim is contacted by an account that appears to belong to someone they already know. Because the account looks familiar, victims are less likely to be suspicious. After some casual conversation, the attacker suggests catching up over a Zoom call. 

Before the meeting, the victim is sent a link that looks legitimate but is often masked or subtly altered. When the call starts, the victim sees real video footage of the impersonated person or their supposed colleagues. Monahan explained that these videos are not deepfakes, but recycled recordings taken from past hacks or publicly available sources like interviews or podcasts, making the setup look very convincing.

Once the call is underway, the attackers pretend to have audio or technical problems and ask the victim to install a patch or update to fix the issue. That file is the key to the attack. Opening it installs malware on the victim’s device, granting the hackers access to sensitive information. Shortly after, the attackers abruptly end the call, usually claiming they need to reschedule, all while trying to avoid raising suspicion. By the time the victim realizes something is wrong, their device may already be fully compromised.

The malware allows attackers to steal private keys, passwords, company data, and access to messaging apps like Telegram. Control of Telegram accounts is especially dangerous, as hackers then use stored contacts to impersonate the victim and target friends, colleagues, and business partners.

Monahan advised that anyone who clicked a suspicious Zoom-related link should immediately disconnect from WiFi and power down the affected device. Using a separate, uncompromised device, victims should move crypto assets to new wallets, change all passwords, enable two-factor authentication, and secure their Telegram account by terminating all other sessions and updating security settings. A full memory wipe of the infected device is recommended before it is used again.

If a Telegram account is compromised, victims should urgently alert their contacts, as silence increases the likelihood that friends and colleagues will be scammed next.

Ethereum Fusaka Bug Exposes Flaw

Meanwhile, Prysm developers confirmed that a software bug introduced ahead of Ethereum’s Fusaka upgrade was responsible for a node validation issue that disrupted the network earlier this month.

In a post-mortem that was published Sunday, Ethereum developer Terence Tsao explained that the incident, which occurred on Dec. 4, stemmed from a flaw that was deployed to testnets roughly a month before Fusaka went live on mainnet. Although the bug existed in testing environments, it was never triggered before the upgrade, allowing it to reach production unnoticed. The issue originated from a specific Prysm code change that altered how the client handled certain edge cases involving out-of-sync nodes.

When the bug was activated on mainnet, Prysm nodes began experiencing severe resource exhaustion while processing attestations. Instead of relying on the current head state of the chain, affected nodes attempted to regenerate older states from scratch. This forced Prysm to replay historical epoch blocks and recompute computationally expensive state transitions, dramatically increasing workload and degrading performance across affected validators.

The impact was measurable but contained. Over a period of more than 42 epochs, Ethereum experienced an elevated missed slot rate of roughly 18.5%, while validator participation fell to about 75%. Prysm estimated that validators running its client collectively lost around 382 Ether in missed attestation rewards during the disruption. Despite these setbacks, Ethereum continued operating without a full loss of finality, and the network recovered once mitigation steps were deployed.

Node operators were quickly instructed to apply a temporary workaround while Prysm developers worked on and released a patch to permanently address the issue. The fix ensured that Prysm no longer unnecessarily regenerated prior states, eliminating the excessive computational burden that caused the slowdown.

Developers stressed that the incident could have been much more severe if it affected Ethereum’s dominant consensus client, Lighthouse. Prysm currently accounts for about 17.6% of the network, making it the second-largest client by share. Because no single client controlled more than one-third of validators at the time, Ethereum avoided a temporary loss of finality or widespread block production failures.

The episode nonetheless reignited concerns around client concentration. Lighthouse still represents more than half of Ethereum’s consensus layer, leaving the network uncomfortably close to the threshold where a single client bug could have systemic consequences. 

Source: https://coinpaper.com/13104/north-korea-linked-hackers-behind-surge-in-zoom-scam-attacks

Piyasa Fırsatı
SURGE Logosu
SURGE Fiyatı(SURGE)
$0,04035
$0,04035$0,04035
-8,04%
USD
SURGE (SURGE) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Volante Technologies Customers Successfully Navigate Critical Regulatory Deadlines for EU SEPA Instant and Global SWIFT Cross-Border Payments

Volante Technologies Customers Successfully Navigate Critical Regulatory Deadlines for EU SEPA Instant and Global SWIFT Cross-Border Payments

PaaS leader ensures seamless migrations and uninterrupted payment operations LONDON–(BUSINESS WIRE)–Volante Technologies, the global leader in Payments as a Service
Paylaş
AI Journal2025/12/16 17:16
Fed Acts on Economic Signals with Rate Cut

Fed Acts on Economic Signals with Rate Cut

In a significant pivot, the Federal Reserve reduced its benchmark interest rate following a prolonged ten-month hiatus. This decision, reflecting a strategic response to the current economic climate, has captured attention across financial sectors, with both market participants and policymakers keenly evaluating its potential impact.Continue Reading:Fed Acts on Economic Signals with Rate Cut
Paylaş
Coinstats2025/09/18 02:28
Google's AP2 protocol has been released. Does encrypted AI still have a chance?

Google's AP2 protocol has been released. Does encrypted AI still have a chance?

Following the MCP and A2A protocols, the AI Agent market has seen another blockbuster arrival: the Agent Payments Protocol (AP2), developed by Google. This will clearly further enhance AI Agents' autonomous multi-tasking capabilities, but the unfortunate reality is that it has little to do with web3AI. Let's take a closer look: What problem does AP2 solve? Simply put, the MCP protocol is like a universal hook, enabling AI agents to connect to various external tools and data sources; A2A is a team collaboration communication protocol that allows multiple AI agents to cooperate with each other to complete complex tasks; AP2 completes the last piece of the puzzle - payment capability. In other words, MCP opens up connectivity, A2A promotes collaboration efficiency, and AP2 achieves value exchange. The arrival of AP2 truly injects "soul" into the autonomous collaboration and task execution of Multi-Agents. Imagine AI Agents connecting Qunar, Meituan, and Didi to complete the booking of flights, hotels, and car rentals, but then getting stuck at the point of "self-payment." What's the point of all that multitasking? So, remember this: AP2 is an extension of MCP+A2A, solving the last mile problem of AI Agent automated execution. What are the technical highlights of AP2? The core innovation of AP2 is the Mandates mechanism, which is divided into real-time authorization mode and delegated authorization mode. Real-time authorization is easy to understand. The AI Agent finds the product and shows it to you. The operation can only be performed after the user signs. Delegated authorization requires the user to set rules in advance, such as only buying the iPhone 17 when the price drops to 5,000. The AI Agent monitors the trigger conditions and executes automatically. The implementation logic is cryptographically signed using Verifiable Credentials (VCs). Users can set complex commission conditions, including price ranges, time limits, and payment method priorities, forming a tamper-proof digital contract. Once signed, the AI Agent executes according to the conditions, with VCs ensuring auditability and security at every step. Of particular note is the "A2A x402" extension, a technical component developed by Google specifically for crypto payments, developed in collaboration with Coinbase and the Ethereum Foundation. This extension enables AI Agents to seamlessly process stablecoins, ETH, and other blockchain assets, supporting native payment scenarios within the Web3 ecosystem. What kind of imagination space can AP2 bring? After analyzing the technical principles, do you think that's it? Yes, in fact, the AP2 is boring when it is disassembled alone. Its real charm lies in connecting and opening up the "MCP+A2A+AP2" technology stack, completely opening up the complete link of AI Agent's autonomous analysis+execution+payment. From now on, AI Agents can open up many application scenarios. For example, AI Agents for stock investment and financial management can help us monitor the market 24/7 and conduct independent transactions. Enterprise procurement AI Agents can automatically replenish and renew without human intervention. AP2's complementary payment capabilities will further expand the penetration of the Agent-to-Agent economy into more scenarios. Google obviously understands that after the technical framework is established, the ecological implementation must be relied upon, so it has brought in more than 60 partners to develop it, almost covering the entire payment and business ecosystem. Interestingly, it also involves major Crypto players such as Ethereum, Coinbase, MetaMask, and Sui. Combined with the current trend of currency and stock integration, the imagination space has been doubled. Is web3 AI really dead? Not entirely. Google's AP2 looks complete, but it only achieves technical compatibility with Crypto payments. It can only be regarded as an extension of the traditional authorization framework and belongs to the category of automated execution. There is a "paradigm" difference between it and the autonomous asset management pursued by pure Crypto native solutions. The Crypto-native solutions under exploration are taking the "decentralized custody + on-chain verification" route, including AI Agent autonomous asset management, AI Agent autonomous transactions (DeFAI), AI Agent digital identity and on-chain reputation system (ERC-8004...), AI Agent on-chain governance DAO framework, AI Agent NPC and digital avatars, and many other interesting and fun directions. Ultimately, once users get used to AI Agent payments in traditional fields, their acceptance of AI Agents autonomously owning digital assets will also increase. And for those scenarios that AP2 cannot reach, such as anonymous transactions, censorship-resistant payments, and decentralized asset management, there will always be a time for crypto-native solutions to show their strength? The two are more likely to be complementary rather than competitive, but to be honest, the key technological advancements behind AI Agents currently all come from web2AI, and web3AI still needs to keep up the good work!
Paylaş
PANews2025/09/18 07:00