The post Inside North Korea’s New Deepfake Crypto Scam appeared on BitcoinEthereumNews.com. North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated. Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets. Sponsored Sponsored North Korea — A Crypto Hacking Pioneer North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved. Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again. According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools. BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure. Novel Tactics Explained In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing. Sponsored Sponsored Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams. Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems. Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually… The post Inside North Korea’s New Deepfake Crypto Scam appeared on BitcoinEthereumNews.com. North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated. Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets. Sponsored Sponsored North Korea — A Crypto Hacking Pioneer North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved. Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again. According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools. BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure. Novel Tactics Explained In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing. Sponsored Sponsored Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams. Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems. Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually…

Inside North Korea’s New Deepfake Crypto Scam

For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

North Korean crypto hackers are refining a familiar scam. They once relied on fake job offers and investment pitches to spread malware — now their methods are becoming more sophisticated.

Previously, these attacks depended on victims interacting directly with infected files. But tighter coordination among hacker groups has allowed them to overcome this weakness, using recycled video calls and impersonations of Web3 executives to deceive targets.

Sponsored

Sponsored

North Korea — A Crypto Hacking Pioneer

North Korean crypto hackers are already a global menace, but their infiltration tactics have significantly evolved.

Whereas these criminals used to only seek employment in Web3 firms, they’ve been using fake job offers to spread malware more recently. Now, this plan is expanding again.

According to reports from Kaspersky, a digital security firm, these North Korean crypto hackers are employing new tools.

BlueNoroff APT, a sub-branch of Lazarus Group, the most feared DPRK-based criminal organization, has two such active campaigns. Dubbed GhostCall and GhostHire, both share the same management infrastructure.

Novel Tactics Explained

In GhostCall, these North Korean crypto hackers will target Web3 executives, posing as potential investors. GhostHire, on the other hand, attracts blockchain engineers with tempting job offers. Both tactics have been in use since last month at the latest, but the threat has been increasing.

Sponsored

Sponsored

Whoever the target is, the actual scam is the same: they trick a prospective mark into downloading malware, whether it be a phony “coding challenge” or a clone of Zoom or Microsoft Teams.

Either way, the victim only needs to engage with this trapped platform, at which point the North Korean crypto hackers can compromise their systems.

Kaspersky noted a series of marginal improvements, like focusing on crypto developers’ preferred operating systems. The scams have a common point of failure: the victim has to actually interact with suspicious software.

This has harmed previous scams’ success rate, but these North Korean hackers have found a new way to recycle lost opportunities.

Turning Failures into New Weapons

Specifically, the enhanced coordination between GhostCall and GhostHire has enabled hackers to improve their social engineering. In addition to AI-generated content, they can also use hacked accounts from genuine entrepreneurs or fragments of real video calls to make their scams believable.

One can only imagine how dangerous this is. A crypto executive might cut off contact with a suspicious recruiter or investor, only to have their likeness later weaponized against new victims.

Using AI, hackers can synthesize new “conversations” that mimic a person’s tone, gestures, and surroundings with alarming realism.

Even when these scams fail, the potential damage remains severe. Anyone approached under unusual or high-pressure circumstances should stay vigilant—never download unfamiliar software or engage with requests that seem out of place.

Source: https://beincrypto.com/north-korea-deepfake-crypto-scam-lazarus/

Market Opportunity
Moonveil Logo
Moonveil Price(MORE)
$0.000389
$0.000389$0.000389
-15.76%
USD
Moonveil (MORE) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details

DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details

The post DeFi Platform Operating on BNB Chain Attacked by Hackers! How Much Lost? Here Are the Details appeared on BitcoinEthereumNews.com. New Gold Protocol (NGP), a decentralized finance (DeFi) platform operating on BNB Chain, was hit with a $2 million attack on Wednesday. The attack targeted the protocol’s liquidity pool, resulting in significant losses. NGP Protocol on BNB Chain Loses $2 Million Web3 security firm Blockaid explained that the attack was based on price oracle manipulation. The attacker targeted the getPrice function in the NGP smart contract. This function calculates the token price by directly referencing Uniswap V2 pool reserves. However, according to Blockaid, “the instant price from a single DEX pool is not secure because attackers can easily manipulate reserves with a flash loan.” The attacker executed a large swap using a flash loan for a large amount of tokens. This increased the pool’s USDT reserves, decreased the NGP reserves, and caused the price oracle to report an artificially low value. This manipulation allowed the contract’s transaction limit to be exceeded, allowing the attacker to acquire a large amount of NGP tokens at a low price. On-chain security firm PeckShield reported that the stolen funds were transferred through Tornado Cash. The NGP token price also plummeted by 88% following the attack. This incident is the latest in a series of attacks targeting DeFi protocols. Last week, the Sui-based Nemo Protocol suffered a similar $2.6 million loss. According to Chainalysis data, more than $2 billion was stolen from crypto services in the first half of 2025 alone. This figure is higher than the same period in previous years, indicating increasing security risks in the sector. *This is not investment advice. Follow our Telegram and Twitter account now for exclusive news, analytics and on-chain data! Source: https://en.bitcoinsistemi.com/defi-platform-operating-on-bnb-chain-attacked-by-hackers-how-much-lost-here-are-the-details/
Share
BitcoinEthereumNews2025/09/19 01:36
Solana Price Prediction Stuck at $85 While Pepeto Presale Delivers What Solana Holders Have Been Waiting For

Solana Price Prediction Stuck at $85 While Pepeto Presale Delivers What Solana Holders Have Been Waiting For

The solana price prediction for March 2026 hinges on whether the $80 support holds or breaks, and the data suggests that solana is compressing into the tightest
Share
Techbullion2026/03/08 10:39
Apple (AAPL) Stock Gets $350 Price Target From Wedbush While One Pre-IPO Asset Targets 267x Returns

Apple (AAPL) Stock Gets $350 Price Target From Wedbush While One Pre-IPO Asset Targets 267x Returns

Key Takeaways: In this article, we highlight essential information about Apple (AAPL) Stock. – Wedbush raised Apple (AAPL) stock to a Street high $350 target with
Share
Techbullion2026/03/08 10:03