North Korean hackers use malicious Zoom calls to target crypto users on Telegram

2025-12-16 12:46

North Korean hackers are increasingly using deceptive Zoom meetings to compromise victims and steal crypto assets, according to the cybersecurity nonprofit Security Alliance (SEAL).

These malicious Zoom meetings, which often target high-level crypto figures, have become a daily occurrence, the SEAL team warned in a recent X post.

“SEAL is tracking multiple DAILY attempts by North Korean actors utilizing ‘Fake Zoom’ tactics for spreading malware as well as escalating their access to new victims. Social engineering is at the root of the attack,” the group wrote.

In a separate post published the same day, cybersecurity researcher Taylor Monahan explained that this attack vector has already drained over $300 million from the wallets of unsuspecting users.

North Korean hackers use Zoom to push malicious script

The scam usually begins with bad actors reaching out through a Telegram account that belongs to someone the victim knows. 

Because the account is familiar, the victim is lulled into a false sense of trust and eventually drawn into a casual conversation that leads to a Zoom video call invitation.

Hackers then share a malicious link disguised to look like a standard Zoom invite. On that page, victims may see what appears to be their contact, along with supposed colleagues or partners. 

According to Monahan, these are not deepfakes but real videos recorded from earlier hacks or publicly available sources like podcasts.

Once the call begins, the hackers pretend to have audio problems and convince the victim that a patch is needed to resolve the issue. 

The victim is then sent a file to install, often named something like “Zoom Update SDK.scpt”, which executes malicious AppleScript code. In other cases, victims are asked to copy and paste a fix into their terminal.

“The ‘update’ is often a ‘Zoom Update SDK.scpt’ which opens or runs in AppleScript. There are a lot of blank spaces to hide the malicious code. In other cases you copy and paste the ‘fix.’ It says it’s successful. But it doesn’t resolve the issue. So you eventually reschedule,” Monahan explained.

What the victim does not realize is that the malware is already active as the malicious script silently infects the system and begins exfiltrating sensitive data, stealing passwords, browser-stored crypto wallets, and even full access to the user’s Telegram account.

How to prevent losses

As a post-incident measure, Monahan advises anyone who may have clicked on such a link or opened a suspicious file to immediately disconnect from WiFi and power down the affected device. 

Using a separate, uncompromised device, victims should transfer their crypto assets to new wallets, change all login credentials, and activate two-factor authentication wherever possible.

She also stressed the importance of locking down Telegram accounts, advising users to log in via a phone, go to settings, terminate all active sessions except the current one, change the password, and enable multifactor authentication.

Most critically, Monahan urged victims to alert their contacts right away, as the attackers often use access to Telegram accounts to identify and target the next round of victims.

” If they hack your telegram, you need to TELL EVERYONE ASAP. You are about [to] hack your friends. Please put your pride aside and SCREAM abt it,” she added.

A recurring attack vector

North Korean hackers, who are believed to be behind some of the largest crypto thefts in recent years, including the $1.5 billion Bybit hack, have increasingly used these malicious Zoom tactics to infiltrate high-profile targets throughout 2025.

One such case in September involved THORChain co-founder JP Thor, who reportedly lost around $1.3 million after falling for a similar scam. 

A malicious script triggered during the fake Zoom call accessed his iCloud storage, extracted his MetaMask wallet credentials, and drained funds, all without triggering any security prompts or admin warnings.

Beyond Zoom calls, these hackers have even employed other complex attack vectors, such as embedding malware directly within Ethereum and BNB smart contracts to stealthily siphon cryptocurrencies.

The post North Korean hackers use malicious Zoom calls to target crypto users on Telegram appeared first on Invezz

origin »

Emerald Crypto (EMD) на Currencies.ru

$ 0 (+0.00%)
Объем 24H $0
Изменеия 24h: 0.00 %, 7d: 4.67 %
Cегодня L: $0 - H: $0
Капитализация $0 Rank 99999
Доступно / Всего 19.117m EMD / 32m EMD

crypto zoom users hackers korean north disguised

crypto zoom → Результатов: 30


Фото:

Did Bitcoin Crash Or Dip? Crypto’s Trajectory Moving Forward

Given the decline of cryptocurrency markets over the past week, it may be a good time to put things into perspective about the latest dip. While the usual advice to ‘zoom out’ is scant comfort during a bear season, it may be reassuring to note that many of bitcoin’s metrics are still in an upwards […] The post Did Bitcoin Crash Or Dip? Crypto’s Trajectory Moving Forward appeared first on Crypto Briefing.

2019-9-28 21:31


Bitcoin Weekly Chart – What is BTC Telling Us?

GREEN CANDLES! When moon? We’re going to $10,000 now! Just some of the terms you see flying about in the crypto community the past week via various social media platforms. But if we just take a step back and zoom out, what is the Bitcoin weekly candle signaling or hinting? I always like to analyze […] The post Bitcoin Weekly Chart – What is BTC Telling Us? appeared first on ZyCrypto.

2019-4-7 11:45