February 11 News, Google’s security team Mandiant disclosed that a North Korea-linked hacker group is using deepfake videos and fake Zoom calls to carry out highly targeted social engineering attacks against the cryptocurrency industry, and is deploying multiple malicious programs to steal assets and data.
The investigation shows that this operation was launched by the cyber threat group UNC1069. The group has been active since at least 2018 and shifted its focus from traditional finance to the Web3 space after 2023, targeting executives of crypto financial technology companies, software developers, and venture capital professionals. The incident began when an industry executive’s Telegram account was hijacked. The attacker impersonated the individual to contact targets, build trust, and then send fake Calendly video meeting invitations.
After victims clicked the link, they were directed to a fake Zoom domain controlled by the attacker. During the call, the attacker played a deepfake video of what appeared to be the CEO of another crypto company, and claimed there was an “audio malfunction,” tricking the target into running a supposed troubleshooting command on their computer. These commands triggered an infection chain on macOS and Windows systems, silently deploying up to seven malicious software programs.
Mandiant confirmed that these tools can steal Keychain credentials, browser cookies, login information, Telegram sessions, and local sensitive files. Researchers believe that the attackers aim both to directly acquire crypto assets and to gather intelligence for future scams. Deploying so many tools on a single device indicates a carefully planned targeted infiltration.
This incident is not isolated. By 2025, similar AI conference scams had caused losses exceeding $300 million; throughout the year, cyber operations related to North Korea stole approximately $2.02 billion in digital assets, a 51% increase. Chainalysis also pointed out that scam groups utilizing on-chain AI services are significantly more efficient than traditional methods.
As the barrier to deepfake technology continues to lower, the crypto industry faces unprecedented security challenges. Experts warn that online meetings involving funds and system permissions must strengthen multi-factor authentication and device isolation; otherwise, they could become the next attack vector.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Venus Protocol Hit by "Liquidation Bomb" Attack: Hacker Disguised as Normal Operations for 9 Months, Created $2.15 Million Bad Debt
BNB Chain's lending protocol Venus Protocol fell victim to a hacker attack on March 16 that had been planned for 9 months, ultimately resulting in the extraction of approximately $5.07 million in assets and causing $2.15 million in bad debt. The attacker manipulated the price of THE token to trigger liquidations, and Venus responded by reducing collateral factors across multiple markets, highlighting the risks DeFi protocols face with low-liquidity tokens.
動區BlockTempo21m ago
China's Digital Yuan Operations Management Center Announces Three Types of Fraud Schemes
The China Digital Renminbi Operation and Management Center has announced three types of scams: pyramid schemes disguised as promotional activities, scams that lure transfers through rebate schemes for fake orders, and schemes that trick users into downloading counterfeit apps to steal information and funds.
GateNews1h ago
White Hat Hacker Discloses Critical Vulnerability in Injective Protocol Involving 500 Million Dollars in Assets, Bug Bounty Dispute Remains Unresolved
White hat hacker f4lc0n discovered a serious vulnerability in the Injective protocol that could have led to the theft of $500 million in assets. Although the fix was rewarded with only a $50,000 bounty, which is below the maximum standard of $500,000, f4lc0n disputes this and plans to continue exposing the issue.
GateNews1h ago
Venus Protocol Suffers Supply Cap Attack, Loses $3.7 Million
Decentralized lending platform Venus Protocol recently suffered a supply cap manipulation attack targeting the Thena token, resulting in losses exceeding $3.7 million. The attacker accumulated tokens over 9 months through gradual methods, ultimately bypassing the supply cap and manipulating the price to cause massive asset borrowing. The platform has suspended related lending and withdrawal functions to mitigate risks, exposing systemic vulnerabilities in DeFi protocols regarding long-term monitoring and low-liquidity tokens.
MarketWhisper2h ago
Aave and CoW Swap release contradictory analysis reports regarding the $50 million loss caused by high slippage trading.
On March 16th, Aave and CoW Swap each released reports regarding the "high slippage trading loss of $50 million" incident. Aave attributed the problem to insufficient market liquidity, while CoW Swap pointed out outdated gas limits and transactions not being submitted on-chain. The two parties held opposing views, and neither mentioned the approximately $44 million MEV bot-related situation.
GateNews3h ago
Venus Protocol Releases THE Pool Attack Analysis, Collateral Factor Reduced to 0 for 7 Markets
Venus Protocol on March 15th disclosed follow-up developments regarding abnormal activity in the THE liquidity pool, suspending borrowing and withdrawals of THE, and reducing collateral factors to 0 across 7 markets to prevent risks for certain users. Preliminary investigation shows that the attacker accumulated 84% of THE tokens through normal deposit methods and manipulated prices by exploiting on-chain liquidity constraints and oracle delays. The platform will maintain transparency and publish a comprehensive report upon completion of the investigation.
GateNews4h ago