February 11 News, Google’s security team Mandiant disclosed that a North Korea-linked hacker group is using deepfake videos and fake Zoom calls to carry out highly targeted social engineering attacks against the cryptocurrency industry, and is deploying multiple malicious programs to steal assets and data.
The investigation shows that this operation was launched by the cyber threat group UNC1069. The group has been active since at least 2018 and shifted its focus from traditional finance to the Web3 space after 2023, targeting executives of crypto financial technology companies, software developers, and venture capital professionals. The incident began when an industry executive’s Telegram account was hijacked. The attacker impersonated the individual to contact targets, build trust, and then send fake Calendly video meeting invitations.
After victims clicked the link, they were directed to a fake Zoom domain controlled by the attacker. During the call, the attacker played a deepfake video of what appeared to be the CEO of another crypto company, and claimed there was an “audio malfunction,” tricking the target into running a supposed troubleshooting command on their computer. These commands triggered an infection chain on macOS and Windows systems, silently deploying up to seven malicious software programs.
Mandiant confirmed that these tools can steal Keychain credentials, browser cookies, login information, Telegram sessions, and local sensitive files. Researchers believe that the attackers aim both to directly acquire crypto assets and to gather intelligence for future scams. Deploying so many tools on a single device indicates a carefully planned targeted infiltration.
This incident is not isolated. By 2025, similar AI conference scams had caused losses exceeding $300 million; throughout the year, cyber operations related to North Korea stole approximately $2.02 billion in digital assets, a 51% increase. Chainalysis also pointed out that scam groups utilizing on-chain AI services are significantly more efficient than traditional methods.
As the barrier to deepfake technology continues to lower, the crypto industry faces unprecedented security challenges. Experts warn that online meetings involving funds and system permissions must strengthen multi-factor authentication and device isolation; otherwise, they could become the next attack vector.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
South Korea's National Tax Service shows mnemonic phrases, 4.8 million USD worth of cryptocurrency stolen! The thief returned it only to steal it again
South Korea's National Tax Service accidentally leaked cryptocurrency seed phrases, leading to assets worth approximately $4.8 million being stolen. The first thief surrendered and returned the assets, but they were stolen again by others. Experts criticized the National Tax Service for not taking necessary protective measures, and authorities admitted the mistake and promised to strengthen security systems.
CryptoCity19m ago
Cosmos discovers security vulnerability affecting some EVM Stack blockchains, Saga has released a patch
Gate News Announcement, March 10th, Cosmos Labs disclosed that a security vulnerability has been recently discovered, affecting some blockchains built on the Cosmos EVM Stack. This vulnerability has impacted Layer 1 blockchains in the production environment.
GateNews1h ago
Bing AI search results poisoned, malicious OpenClaw installer stealing confidential information
Slow Mist Technology warns that attackers are poisoning Bing AI search results to promote fake OpenClaw installers, tricking users into downloading malware. Attackers are using GitHub to create fake repositories, simply hosting malicious code on the platform to contaminate search results. On Windows and macOS, the malware employs specific intrusion methods and can steal sensitive information. Users should avoid downloads from unknown sources and stay vigilant.
MarketWhisper1h ago
Gondi initiates compensation after $230,000 vulnerability, recovers stolen NFTs and returns them to the original owner
NFT Lending Protocol Gondi Announces Compensation for Users Who Suffered Losses Due to Smart Contract Vulnerability, with Approximately 78 NFTs stolen, estimated at around $230,000. The vulnerability stemmed from a logical flaw in the "Sell & Repay" contract, allowing attackers to transfer NFTs without owning them. Gondi is currently compensating users through a three-pronged approach: contacting affected users, recovering stolen NFTs, and repurchasing similar items using the proceeds. Other platform functions have returned to normal.
MarketWhisper2h ago
Attackers poison Bing AI search results, forging OpenClaw programs to steal crypto assets
Gate News Report, March 10th, SlowMist Technology Chief Information Security Officer 23pds posted on the X platform that attackers have launched poisoning attacks on Bing AI search results, tricking users into downloading and installing counterfeit OpenClaw programs, thereby stealing users' crypto assets and sensitive information.
GateNews3h ago
NFT platform Gondi suffers contract vulnerability attack, loses $230,000, promises full compensation to affected users
NFT platform Gondi was subjected to a contract vulnerability attack on March 10th, resulting in the theft of 78 NFTs and a loss of approximately $230,000. The issue stemmed from a logical flaw in the new version of the Sell & Repay contract. Gondi has taken control of the situation, disabled related functions, is actively compensating affected users, and is pursuing the stolen NFTs.
GateNews4h ago