🔥 BitDegree partnered with Ogvio - a free international money transfer service! Sign up now & grab Rewards! 🎁

North Korean Hackers Use Deepfake Calls to Target Crypto Firms

Key Takeaways

  • ​Mandiant reports that North Korean groups now use AI deepfake videos in fake meetings to gain trust and target crypto and DeFi firms;
  • Analysts linked a recent fintech breach to UNC1069, which used a hijacked Telegram account, a fake Zoom call, and the ClickFix method;
  • The attackers used a deepfake of a known CEO and prompted the victim to run “troubleshooting” commands that enabled malware.

Stop overpaying - start transferring money with Ogvio. Sign up, invite friends & grab Rewards now! 🎁

North Korean Hackers Use Deepfake Calls to Target Crypto Firms

Google’s Mandiant team released a notice on February 9 describing new activity linked to North Korean threat groups.

The report explained that attackers use AI-generated deepfake videos in fake online meetings to gain trust and carry out attacks on crypto and DeFi companies.

Mandiant recently reviewed an incident at a fintech firm and linked it with high confidence to UNC1069, also known as “CryptoCore". The group used a hijacked Telegram account, a fake Zoom meeting, and a method called ClickFix.

What is Basic Attention Token (BAT)? Brave Browser EASILY Explained

Did you know?

Want to get smarter & wealthier with crypto?

Subscribe - We publish new crypto explainer videos every week!

Analysts also found signs that an AI-generated video was used to impersonate a known industry figure during the fake meeting.

The report said, “Mandiant has observed UNC1069 employing these techniques to target both corporate entities and individuals within the cryptocurrency industry, including software firms and their developers, as well as venture capital firms and their employees or executives”.

The attack began when the victim received a Telegram message from what seemed to be a familiar crypto executive. After a short exchange, the attacker sent a Calendly link for a 30-minute call.

The link redirected the victim to a fake Zoom session hosted on the group's servers.

During the call, the victim saw what appeared to be a deepfake video of a well-known CEO. Later, the attackers claimed there were audio issues. They then asked the victim to run several “troubleshooting” commands.

A later forensic review found seven kinds of malware on the victim’s device. The tools were designed to collect passwords, browser data, and session tokens.

TRM Labs reported that crypto scammers made major use of AI in 2025. What did the company say? Read the full story.

Aaron S. Editor-In-Chief
Having completed a Master’s degree in Economics, Politics, and Cultures of the East Asia region, Aaron has written scientific papers analyzing the differences between Western and Collective forms of capitalism in the post-World War II era.
With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He’s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.
Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain & Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.
Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.

Loading...
binance
×
Verified

ZERO FEES

For Ogvio Money Transfers
Rating
5.0