Security Firm: North Korean Hackers' "Fake Zoom" Software Attack Has Become a Daily Threat, Stealing Over $300 Million in Assets
BlockBeats News, December 15th, Security Alliance, a nonprofit cybersecurity organization, warned that they are currently detecting multiple scam attempts initiated by North Korean hackers every day, and these attacks use a fake Zoom meeting to lure victims.
The scam involves enticing victims to download malware during a "fake Zoom call," thereby stealing sensitive information including passwords and private keys. Security researcher Taylor Monahan warned that this tactic has siphoned off over $300 million in assets from users.
The scam typically starts with a message from a Telegram account, often belonging to someone the victim "knows." Due to the familiar identity, the victim lowers their guard. Subsequently, the conversation naturally transitions to an invitation to "catch up via Zoom." Once the call begins, the hacker pretends to encounter audio issues and sends a supposed "patch file." When the victim opens this file, their device is infected with malware. The hacker then ends this fake call citing "Let's reschedule for another day."
You may also like

U.S. Government Shutdown Threat Impacts Bitcoin and Crypto Markets
Key Takeaways The risk of a U.S. government shutdown has surged, with predicted odds now approaching 80% as…

VF-26 Unveiled: Zoomex and TGR Haas F1 Team Enter New Phase of Collaboration in 2026
Key Takeaways The unveiling of the VF-26 race car marks a new phase in the TGR Haas F1…

WEEX Crypto News and the Dynamics of API Access
Key Takeaways Managing API access effectively is crucial for seamless data extraction in cryptocurrency markets. Understanding rate limits…

Traveling? ‘Evil Twin’ WiFi networks can steal crypto passwords
Key Takeaways “Evil Twin” WiFi attacks occur when hackers mimic legitimate WiFi networks to steal sensitive user data.…

ThunderChain Resumes Legal Battle as Former CEO Chen Lei Accused of Embezzlement for Cryptocurrency Speculation - What Happened Back Then?

Current Landscape of Cryptocurrency Exchanges in 2026
Key Takeaways The cryptocurrency exchange market is notably competitive, with each platform offering unique strengths to attract users.…

Error Prevented Content Extraction: Causes and Solutions
Key Takeaways Excessive requests can result in blocked access to data sources. Ensuring adherence to API usage policies…

A computation bug that allowed Truebit to be hacked for 8535 ETH

Vietnam Sets Mid-January Timeline for Pilot Crypto Exchange Approvals
Key Takeaways Vietnam aims to regulate its growing cryptocurrency market by licensing pilot digital asset exchanges under a…

Ledger Faces Yet Another Data Breach — Customer Information at Risk
Key Takeaways Ledger, the prominent hardware wallet manufacturer, has experienced another data breach via its payment processor, Global-e,…

2025 Crypto Violence Retrospective: Increasing Assaults and Fatal Incidents in a Growing Market
Key Takeaways Violent incidents involving cryptocurrency holders have escalated, with 2025 documenting 65 attacks, including 4 fatalities. The…

Court Sentences Criminal in Virtual Currency Fraud Case with Major Global Implications
Key Takeaways A landmark case in Beijing reveals a significant cross-border telecom and internet fraud scheme involving virtual…

Rep. Torres Targets Insider Trading on Prediction Markets Following Profitable Maduro Bet
Key Takeaways A substantial Polymarket wager concerning Maduro’s capture has led Rep. Ritchie Torres to propose new legislation…

Cybersecurity Firm Warns of Shai-Hulud 3.0 Threatening the NPM Ecosystem
Key Takeaways SlowMist’s CISO has issued a warning about Shai-Hulud 3.0, a significant threat targeting the NPM ecosystem…

SlowMist Warns of Return of Shai-Hulud 3.0 Supply Chain Attack
Key Takeaways SlowMist’s Chief Information Security Officer alerted the community about the resurgence of Shai-Hulud 3.0, an advanced…

Hackers Exploit Rainbow Six Siege Servers, Ubisoft Responds
Key Takeaways Hackers successfully breached Rainbow Six Siege, distributing enormous amounts of in-game currency. Players discovered unexpected changes…

Trust Wallet Investigates Browser Extension Security Incident
Key Takeaways A recent security incident in Trust Wallet’s browser extension has affected 2,596 wallets, leading to the…

Trust Wallet Users Experience $7 Million Loss Due to Hacked Chrome Extension
Key Takeaways Trust Wallet faced a significant security breach affecting its Chrome extension, resulting in over $7 million…
U.S. Government Shutdown Threat Impacts Bitcoin and Crypto Markets
Key Takeaways The risk of a U.S. government shutdown has surged, with predicted odds now approaching 80% as…
VF-26 Unveiled: Zoomex and TGR Haas F1 Team Enter New Phase of Collaboration in 2026
Key Takeaways The unveiling of the VF-26 race car marks a new phase in the TGR Haas F1…
WEEX Crypto News and the Dynamics of API Access
Key Takeaways Managing API access effectively is crucial for seamless data extraction in cryptocurrency markets. Understanding rate limits…
Traveling? ‘Evil Twin’ WiFi networks can steal crypto passwords
Key Takeaways “Evil Twin” WiFi attacks occur when hackers mimic legitimate WiFi networks to steal sensitive user data.…
ThunderChain Resumes Legal Battle as Former CEO Chen Lei Accused of Embezzlement for Cryptocurrency Speculation - What Happened Back Then?
Current Landscape of Cryptocurrency Exchanges in 2026
Key Takeaways The cryptocurrency exchange market is notably competitive, with each platform offering unique strengths to attract users.…