{"id":63735,"date":"2025-12-16T07:16:30","date_gmt":"2025-12-16T07:16:30","guid":{"rendered":"https:\/\/dogewisperer.com\/?p=63735"},"modified":"2025-12-16T07:16:30","modified_gmt":"2025-12-16T07:16:30","slug":"crypto-firms-face-daily-fake-zoom-attacks-linked-to-north-korea-experts-say","status":"publish","type":"post","link":"https:\/\/dogewisperer.com\/?p=63735","title":{"rendered":"Crypto Firms Face Daily \u2018Fake Zoom\u2019 Attacks Linked To North Korea, Experts Say"},"content":{"rendered":"<div>\n<p>North Korean-linked hackers are using <a href=\"https:\/\/tradebrains.in\/crypto\/north-korean-hackers-turn-fake-zoom-meetings-into-a-300m-crypto-heist-heres-how-millions-were-stolen\/?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener nofollow\">fake Zoom calls<\/a> to drain crypto wallets in what security researchers say has become a near-daily threat to the cryptocurrency community. According to multiple security reports, the campaign has already netted roughly $300 million in stolen funds and shows few signs of slowing.<\/p>\n<h2>Fake Zoom Meetings Used To Drain Wallets<\/h2>\n<p>According to Security Alliance <a href=\"https:\/\/x.com\/_seal_org\/status\/1999946371261252013?s=46&amp;t=MuRujqZUAz3TQE1vmr3c6A\" target=\"_blank\" rel=\"noopener nofollow\">(SEAL)<\/a> and other researchers, attackers first contact targets through messaging apps such as Telegram. They then invite victims to a video call that looks legitimate.<\/p>\n<p>During the call, the impostors claim there is a problem with sound or video and offer a \u201cfix\u201d \u2014 a file or a link that appears to be an official update. When the victim runs the file, malware installs and begins stealing credentials, browser data, and crypto keys.<\/p>\n<p>Several attacks are reported every day, and many follow the same pattern. Researchers say these staged calls let attackers bypass normal caution because people tend to trust someone they see on camera.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">SEAL is tracking multiple DAILY attempts by North Korean actors utilizing \u201cFake Zoom\u201d tactics for spreading malware as well as escalating their access to new victims.<\/p>\n<p>Social engineering is at the root of the attack. Read the thread below for pointers on how to stay secure. <a href=\"https:\/\/t.co\/2SQGdtPKGx\" rel=\"nofollow\">https:\/\/t.co\/2SQGdtPKGx<\/a><\/p>\n<p>\u2014 Security Alliance (@_SEAL_Org) <a href=\"https:\/\/twitter.com\/_SEAL_Org\/status\/1999946371261252013?ref_src=twsrc%5Etfw\" rel=\"nofollow noopener\" target=\"_blank\">December 13, 2025<\/a><\/p>\n<\/blockquote>\n<h2>NimDoor, Other Malware Strains Target macOS And Wallets<\/h2>\n<p>Based on reports, one strain tied to these schemes is <a href=\"https:\/\/www.gopher.security\/news\/north-korean-hackers-deploy-nimdoor-macos-malware-via-fake-zoom-updates?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener nofollow\">NimDoor<\/a>, a macOS backdoor that can harvest keychain items, browser-stored passwords, and messaging data.<\/p>\n<p>Security teams link NimDoor and related tools to <a href=\"https:\/\/www.csoonline.com\/article\/4009603\/north-koreas-bluenoroff-uses-ai-deepfakes-to-push-mac-malware-in-fake-zoom-calls.html?utm_source=chatgpt.com\" target=\"_blank\" rel=\"noopener nofollow\">BlueNoroff<\/a>, a group connected to the Lazarus Group network. BlueNoroff has a long record of attacking crypto firms and exchanges.<\/p>\n<p>Once the malware is in place, wallets have been emptied within minutes. Victims often discover the theft only after seeing outgoing transactions on the blockchain.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full\" src=\"https:\/\/www.tradingview.com\/x\/1zG0U5bU\/\" width=\"1835\" height=\"909\"><br \/>\nDeepfakes And Calendar Invites Make Scams More Convincing<\/p>\n<p>Researchers warn that attackers are not simply using fake names. They are also deploying AI-assisted deepfake video and voice tools to impersonate executives or known contacts.<\/p>\n<p>Attackers sometimes send calendar invites that look like genuine meeting requests from platforms such as Calendly, directing targets to attacker-controlled Zoom links.<\/p>\n<p>The level of social engineering makes the calls seem urgent and official, which reduces the time victims take to question what they are being asked to install.<\/p>\n<p>Attackers Target Individuals And Small Firms Alike<\/p>\n<p>Reports have disclosed that victims include individual traders, startup employees, and small teams at crypto companies. Losses are concentrated but widespread, with estimates around $300,000,000.<\/p>\n<p>Some victims have lost funds tied to browser wallets and hot wallets; others had recovery phrases captured and used to drain accounts.<\/p>\n<p>Security teams urge quick action when a suspicious update is offered during a remote session: They warn not to run it, verify separately, and treat unsolicited meeting fixes as high risk.<\/p>\n<p><em>Featured image from Unsplash, chart from TradingView<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>North Korean-linked hackers are using fake Zoom calls to drain crypto wallets in what security researchers say has become a near-daily threat to the cryptocurrency community. According to multiple security reports, the campaign has already netted roughly $300 million in stolen funds and shows few signs of slowing. Fake Zoom Meetings Used To Drain Wallets [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"iawp_total_views":0,"footnotes":""},"categories":[2],"tags":[3,4,5],"class_list":["post-63735","post","type-post","status-publish","format-standard","hentry","category-news","tag-crypto","tag-doge","tag-news"],"_links":{"self":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/63735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63735"}],"version-history":[{"count":0,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=\/wp\/v2\/posts\/63735\/revisions"}],"wp:attachment":[{"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=63735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogewisperer.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=63735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}