The scam relies on Telegram impersonation and pre recorded video calls to build trust. Malware is delivered as a fake audio or SDK patch during the meeting. SecurityThe scam relies on Telegram impersonation and pre recorded video calls to build trust. Malware is delivered as a fake audio or SDK patch during the meeting. Security

Fake Zoom malware scam tied to North Korean hackers targets crypto users

  • The scam relies on Telegram impersonation and pre recorded video calls to build trust.
  • Malware is delivered as a fake audio or SDK patch during the meeting.
  • Security Alliance says it is tracking multiple such attempts every day.

North Korean cybercriminals are escalating social engineering attacks by exploiting fake Zoom and Teams meetings to deploy malware that drains sensitive data and cryptocurrency wallets.

Cybersecurity firm Security Alliance, also known as SEAL, has warned that it is tracking multiple daily attempts linked to these campaigns.

The activity highlights a shift toward more convincing, real-time deception rather than crude phishing.

The warning follows disclosures by MetaMask security researcher Taylor Monahan, who has been monitoring the pattern closely and flagging the scale of losses already linked to the tactic.

The method relies on familiarity, trust, and workplace habits, making it particularly effective against professionals in crypto and tech who regularly use video conferencing tools.

How the fake Zoom scam works

The attack typically begins on Telegram, where victims receive a message from an account that appears to belong to someone they already know. The attackers specifically target contacts with existing chat history, increasing credibility and lowering suspicion.

Once engagement starts, the victim is guided toward scheduling a meeting through a Calendly link, which leads to what looks like a legitimate Zoom call.

When the meeting opens, the victim sees what appears to be a live video feed of their contact and other team members.

In reality, the footage is pre-recorded, not AI-generated deepfakes.

During the call, the attacker claims there are audio issues and suggests installing a quick fix.

A file is shared in the chat and presented as a patch or software development kit update to restore sound clarity.

That file contains the malware payload. Once installed, it gives the attacker remote access to the victim’s device.

Malware impact on crypto wallets

The malicious software is often a Remote Access Trojan. After installation, it silently extracts sensitive information, including passwords, internal security documentation, and private keys.

In crypto-focused environments, this can result in complete wallet drainage with little immediate indication of compromise.

Monahan has warned on X that more than $300m has already been stolen using variations of this approach, and that the same threat actors continue to exploit fake Zoom and Teams meetings to compromise users.

SEAL has echoed the concern, noting the frequency and consistency of these attempts across the crypto sector.

North Korea’s evolving cyber playbook

North Korean hacking groups have long been linked to financially motivated cybercrime, with proceeds believed to support the regime.

Groups such as Lazarus have previously targeted exchanges and blockchain firms through direct exploits and supply chain attacks.

More recently, these actors have leaned heavily into social engineering.

In recent months, they have infiltrated crypto companies using fake job applications and staged interview processes designed to deliver malware.

Last month, Lazarus was linked to a breach at South Korea’s largest exchange, Upbit, which resulted in losses of roughly $30.6 million.

The fake Zoom tactic reflects a broader strategic pivot toward human-centric attack vectors that bypass technical safeguards.

What experts say users should do

Security experts warn that once a malicious file is executed, speed matters.

In cases of suspected infection during a call, users are advised to immediately disconnect from WiFi and power off the device to interrupt data exfiltration.

The broader warning is to treat unexpected meeting links, software patches, and urgent technical requests with extreme caution, even when they appear to come from known contacts.

The post Fake Zoom malware scam tied to North Korean hackers targets crypto users appeared first on CoinJournal.

Market Opportunity
Scamcoin Logo
Scamcoin Price(SCAM)
$0.000898
$0.000898$0.000898
-2.81%
USD
Scamcoin (SCAM) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Top 3 Cryptos That Could Turn $100 Into $5,000 in 2025 – Including This Meme-to-Earn Token’s Game-Changing Potential

Top 3 Cryptos That Could Turn $100 Into $5,000 in 2025 – Including This Meme-to-Earn Token’s Game-Changing Potential

Discover 3 cryptos with explosive growth potential - Ethereum, Shiba Inu, and MAGAX. Here’s why early investors are eyeing them for 2025.
Share
Blockchainreporter2025/09/18 07:45
Yearn.finance V1 Hacked Again, Losing $300K In Latest Exploit

Yearn.finance V1 Hacked Again, Losing $300K In Latest Exploit

The post Yearn.finance V1 Hacked Again, Losing $300K In Latest Exploit appeared on BitcoinEthereumNews.com. Alarming Breach: Yearn.finance V1 Hacked Again, Losing
Share
BitcoinEthereumNews2025/12/17 10:12
CME Group to Launch Solana and XRP Futures Options

CME Group to Launch Solana and XRP Futures Options

The post CME Group to Launch Solana and XRP Futures Options appeared on BitcoinEthereumNews.com. An announcement was made by CME Group, the largest derivatives exchanger worldwide, revealed that it would introduce options for Solana and XRP futures. It is the latest addition to CME crypto derivatives as institutions and retail investors increase their demand for Solana and XRP. CME Expands Crypto Offerings With Solana and XRP Options Launch According to a press release, the launch is scheduled for October 13, 2025, pending regulatory approval. The new products will allow traders to access options on Solana, Micro Solana, XRP, and Micro XRP futures. Expiries will be offered on business days on a monthly, and quarterly basis to provide more flexibility to market players. CME Group said the contracts are designed to meet demand from institutions, hedge funds, and active retail traders. According to Giovanni Vicioso, the launch reflects high liquidity in Solana and XRP futures. Vicioso is the Global Head of Cryptocurrency Products for the CME Group. He noted that the new contracts will provide additional tools for risk management and exposure strategies. Recently, CME XRP futures registered record open interest amid ETF approval optimism, reinforcing confidence in contract demand. Cumberland, one of the leading liquidity providers, welcomed the development and said it highlights the shift beyond Bitcoin and Ethereum. FalconX, another trading firm, added that rising digital asset treasuries are increasing the need for hedging tools on alternative tokens like Solana and XRP. High Record Trading Volumes Demand Solana and XRP Futures Solana futures and XRP continue to gain popularity since their launch earlier this year. According to CME official records, many have bought and sold more than 540,000 Solana futures contracts since March. A value that amounts to over $22 billion dollars. Solana contracts hit a record 9,000 contracts in August, worth $437 million. Open interest also set a record at 12,500 contracts.…
Share
BitcoinEthereumNews2025/09/18 01:39