The scam relies on Telegram impersonation and pre recorded video calls to build trust. Malware is delivered as a fake audio or SDK patch during the meeting. SecurityThe scam relies on Telegram impersonation and pre recorded video calls to build trust. Malware is delivered as a fake audio or SDK patch during the meeting. Security

Fake Zoom malware scam tied to North Korean hackers targets crypto users

2025/12/15 18:23
  • The scam relies on Telegram impersonation and pre recorded video calls to build trust.
  • Malware is delivered as a fake audio or SDK patch during the meeting.
  • Security Alliance says it is tracking multiple such attempts every day.

North Korean cybercriminals are escalating social engineering attacks by exploiting fake Zoom and Teams meetings to deploy malware that drains sensitive data and cryptocurrency wallets.

Cybersecurity firm Security Alliance, also known as SEAL, has warned that it is tracking multiple daily attempts linked to these campaigns.

The activity highlights a shift toward more convincing, real-time deception rather than crude phishing.

The warning follows disclosures by MetaMask security researcher Taylor Monahan, who has been monitoring the pattern closely and flagging the scale of losses already linked to the tactic.

The method relies on familiarity, trust, and workplace habits, making it particularly effective against professionals in crypto and tech who regularly use video conferencing tools.

How the fake Zoom scam works

The attack typically begins on Telegram, where victims receive a message from an account that appears to belong to someone they already know. The attackers specifically target contacts with existing chat history, increasing credibility and lowering suspicion.

Once engagement starts, the victim is guided toward scheduling a meeting through a Calendly link, which leads to what looks like a legitimate Zoom call.

When the meeting opens, the victim sees what appears to be a live video feed of their contact and other team members.

In reality, the footage is pre-recorded, not AI-generated deepfakes.

During the call, the attacker claims there are audio issues and suggests installing a quick fix.

A file is shared in the chat and presented as a patch or software development kit update to restore sound clarity.

That file contains the malware payload. Once installed, it gives the attacker remote access to the victim’s device.

Malware impact on crypto wallets

The malicious software is often a Remote Access Trojan. After installation, it silently extracts sensitive information, including passwords, internal security documentation, and private keys.

In crypto-focused environments, this can result in complete wallet drainage with little immediate indication of compromise.

Monahan has warned on X that more than $300m has already been stolen using variations of this approach, and that the same threat actors continue to exploit fake Zoom and Teams meetings to compromise users.

SEAL has echoed the concern, noting the frequency and consistency of these attempts across the crypto sector.

North Korea’s evolving cyber playbook

North Korean hacking groups have long been linked to financially motivated cybercrime, with proceeds believed to support the regime.

Groups such as Lazarus have previously targeted exchanges and blockchain firms through direct exploits and supply chain attacks.

More recently, these actors have leaned heavily into social engineering.

In recent months, they have infiltrated crypto companies using fake job applications and staged interview processes designed to deliver malware.

Last month, Lazarus was linked to a breach at South Korea’s largest exchange, Upbit, which resulted in losses of roughly $30.6 million.

The fake Zoom tactic reflects a broader strategic pivot toward human-centric attack vectors that bypass technical safeguards.

What experts say users should do

Security experts warn that once a malicious file is executed, speed matters.

In cases of suspected infection during a call, users are advised to immediately disconnect from WiFi and power off the device to interrupt data exfiltration.

The broader warning is to treat unexpected meeting links, software patches, and urgent technical requests with extreme caution, even when they appear to come from known contacts.

The post Fake Zoom malware scam tied to North Korean hackers targets crypto users appeared first on CoinJournal.

Piyasa Fırsatı
Scamcoin Logosu
Scamcoin Fiyatı(SCAM)
$0.00092
$0.00092$0.00092
-3.05%
USD
Scamcoin (SCAM) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen [email protected] ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Volante Technologies Customers Successfully Navigate Critical Regulatory Deadlines for EU SEPA Instant and Global SWIFT Cross-Border Payments

Volante Technologies Customers Successfully Navigate Critical Regulatory Deadlines for EU SEPA Instant and Global SWIFT Cross-Border Payments

PaaS leader ensures seamless migrations and uninterrupted payment operations LONDON–(BUSINESS WIRE)–Volante Technologies, the global leader in Payments as a Service
Paylaş
AI Journal2025/12/16 17:16
Fed Acts on Economic Signals with Rate Cut

Fed Acts on Economic Signals with Rate Cut

In a significant pivot, the Federal Reserve reduced its benchmark interest rate following a prolonged ten-month hiatus. This decision, reflecting a strategic response to the current economic climate, has captured attention across financial sectors, with both market participants and policymakers keenly evaluating its potential impact.Continue Reading:Fed Acts on Economic Signals with Rate Cut
Paylaş
Coinstats2025/09/18 02:28
Google's AP2 protocol has been released. Does encrypted AI still have a chance?

Google's AP2 protocol has been released. Does encrypted AI still have a chance?

Following the MCP and A2A protocols, the AI Agent market has seen another blockbuster arrival: the Agent Payments Protocol (AP2), developed by Google. This will clearly further enhance AI Agents' autonomous multi-tasking capabilities, but the unfortunate reality is that it has little to do with web3AI. Let's take a closer look: What problem does AP2 solve? Simply put, the MCP protocol is like a universal hook, enabling AI agents to connect to various external tools and data sources; A2A is a team collaboration communication protocol that allows multiple AI agents to cooperate with each other to complete complex tasks; AP2 completes the last piece of the puzzle - payment capability. In other words, MCP opens up connectivity, A2A promotes collaboration efficiency, and AP2 achieves value exchange. The arrival of AP2 truly injects "soul" into the autonomous collaboration and task execution of Multi-Agents. Imagine AI Agents connecting Qunar, Meituan, and Didi to complete the booking of flights, hotels, and car rentals, but then getting stuck at the point of "self-payment." What's the point of all that multitasking? So, remember this: AP2 is an extension of MCP+A2A, solving the last mile problem of AI Agent automated execution. What are the technical highlights of AP2? The core innovation of AP2 is the Mandates mechanism, which is divided into real-time authorization mode and delegated authorization mode. Real-time authorization is easy to understand. The AI Agent finds the product and shows it to you. The operation can only be performed after the user signs. Delegated authorization requires the user to set rules in advance, such as only buying the iPhone 17 when the price drops to 5,000. The AI Agent monitors the trigger conditions and executes automatically. The implementation logic is cryptographically signed using Verifiable Credentials (VCs). Users can set complex commission conditions, including price ranges, time limits, and payment method priorities, forming a tamper-proof digital contract. Once signed, the AI Agent executes according to the conditions, with VCs ensuring auditability and security at every step. Of particular note is the "A2A x402" extension, a technical component developed by Google specifically for crypto payments, developed in collaboration with Coinbase and the Ethereum Foundation. This extension enables AI Agents to seamlessly process stablecoins, ETH, and other blockchain assets, supporting native payment scenarios within the Web3 ecosystem. What kind of imagination space can AP2 bring? After analyzing the technical principles, do you think that's it? Yes, in fact, the AP2 is boring when it is disassembled alone. Its real charm lies in connecting and opening up the "MCP+A2A+AP2" technology stack, completely opening up the complete link of AI Agent's autonomous analysis+execution+payment. From now on, AI Agents can open up many application scenarios. For example, AI Agents for stock investment and financial management can help us monitor the market 24/7 and conduct independent transactions. Enterprise procurement AI Agents can automatically replenish and renew without human intervention. AP2's complementary payment capabilities will further expand the penetration of the Agent-to-Agent economy into more scenarios. Google obviously understands that after the technical framework is established, the ecological implementation must be relied upon, so it has brought in more than 60 partners to develop it, almost covering the entire payment and business ecosystem. Interestingly, it also involves major Crypto players such as Ethereum, Coinbase, MetaMask, and Sui. Combined with the current trend of currency and stock integration, the imagination space has been doubled. Is web3 AI really dead? Not entirely. Google's AP2 looks complete, but it only achieves technical compatibility with Crypto payments. It can only be regarded as an extension of the traditional authorization framework and belongs to the category of automated execution. There is a "paradigm" difference between it and the autonomous asset management pursued by pure Crypto native solutions. The Crypto-native solutions under exploration are taking the "decentralized custody + on-chain verification" route, including AI Agent autonomous asset management, AI Agent autonomous transactions (DeFAI), AI Agent digital identity and on-chain reputation system (ERC-8004...), AI Agent on-chain governance DAO framework, AI Agent NPC and digital avatars, and many other interesting and fun directions. Ultimately, once users get used to AI Agent payments in traditional fields, their acceptance of AI Agents autonomously owning digital assets will also increase. And for those scenarios that AP2 cannot reach, such as anonymous transactions, censorship-resistant payments, and decentralized asset management, there will always be a time for crypto-native solutions to show their strength? The two are more likely to be complementary rather than competitive, but to be honest, the key technological advancements behind AI Agents currently all come from web2AI, and web3AI still needs to keep up the good work!
Paylaş
PANews2025/09/18 07:00