The post North Korean Hackers May Use Fake Zoom Calls to Steal Crypto, Experts Warn of $300M Losses appeared on BitcoinEthereumNews.com. The fake Zoom crypto scamThe post North Korean Hackers May Use Fake Zoom Calls to Steal Crypto, Experts Warn of $300M Losses appeared on BitcoinEthereumNews.com. The fake Zoom crypto scam

North Korean Hackers May Use Fake Zoom Calls to Steal Crypto, Experts Warn of $300M Losses

2025/12/15 11:17
  • Scam initiation: Hackers impersonate known contacts on Telegram to invite victims to a fake Zoom meeting.

  • During the call, audio issues prompt a malicious patch download, infecting devices with malware.

  • Over $300 million stolen to date, according to security researcher Taylor Monahan, targeting passwords, private keys, and crypto holdings.

Discover the fake Zoom crypto scam by North Korean hackers stealing $300M+. Learn how it works and protect your assets today—transfer funds and secure devices now. (142 characters)

What is the fake Zoom crypto scam?

The fake Zoom crypto scam is a sophisticated phishing operation where cybercriminals, believed to be linked to North Korea, trick users into joining fraudulent video calls to deploy malware. This method has resulted in the theft of more than $300 million in cryptocurrency, as reported by cybersecurity experts. Victims often lose access to wallets, passwords, and sensitive data, highlighting the risks in digital communications within the crypto space.


Source: Security Alliance

How do North Korean hackers execute the fake Zoom crypto scam?

Cybersecurity nonprofit Security Alliance (SEAL) has observed a surge in attempts by North Korean-affiliated hackers targeting crypto users through deceptive Zoom invitations. The scam begins with a seemingly innocuous message from a Telegram account mimicking a trusted acquaintance, building familiarity to lower defenses.

Security researcher Taylor Monahan explains that the hackers share a masked link disguised as a legitimate Zoom invite. Once joined, the call features pre-recorded videos of real individuals—sourced from prior hacks, public podcasts, or other accessible footage—rather than deepfakes, to maintain authenticity. As the session progresses, the perpetrators simulate technical glitches like audio failures and send a “patch” file via chat.

Opening this file installs malware that grants remote access to the victim’s device, enabling the theft of private keys, passwords, and cryptocurrency holdings. SEAL reports multiple such incidents daily, with Monahan noting the hackers often end the call casually, claiming to reschedule, to avoid immediate suspicion. “They’ll play it cool to prevent detection,” Monahan stated. “Your computer is already compromised—they will eventually take all your crypto, passwords, and more.”

This tactic exploits the trust in video conferencing tools, which have become integral to remote work and crypto community interactions. Data from SEAL indicates that infected devices can lead to broader compromises, including the hijacking of Telegram accounts to propagate the scam to contacts.

Frequently Asked Questions

What should you do if you’ve fallen for the fake Zoom crypto scam?

If you’ve clicked a suspicious link during a Zoom call, immediately disconnect from WiFi and power off the device to halt malware activity. Use a secure alternative device to transfer cryptocurrency to new wallets, update all passwords, enable two-factor authentication, and perform a full system wipe on the infected machine before reuse. Notify contacts promptly to prevent chain reactions.

How can you protect your Telegram account from North Korean hackers in crypto scams?

To safeguard your Telegram from exploitation in crypto scams like the fake Zoom attack, open the app on your phone, navigate to settings, review active devices, and terminate any unfamiliar sessions. Change your password immediately and enable or update multi-factor authentication. Security expert Taylor Monahan emphasizes alerting friends right away if compromised: “You need to tell everyone ASAP—you could hack your friends next.”


Source: Taylor Monahan

Key Takeaways

  • Recognize red flags early: Unsolicited Zoom invites from Telegram contacts, even familiar ones, warrant verification through alternative channels before joining.
  • Act swiftly on infection: Disconnecting from the network and isolating the device limits damage, allowing time to secure assets elsewhere.
  • Prioritize account hygiene: Regularly audit Telegram sessions and enable MFA to block hackers from using your network to target others in the crypto community.

Conclusion

The fake Zoom crypto scam exemplifies the evolving threats from North Korean hackers in the cryptocurrency ecosystem, with losses exceeding $300 million underscoring the need for vigilance. By understanding how these operations exploit trust in tools like Zoom and Telegram, users can better protect their digital assets through proactive measures and swift responses. As cyber risks persist, staying informed and implementing robust security practices will be essential for safeguarding your crypto portfolio moving forward.

Source: https://en.coinotag.com/north-korean-hackers-may-use-fake-zoom-calls-to-steal-crypto-experts-warn-of-300m-losses

Market Opportunity
MAY Logo
MAY Price(MAY)
$0.01266
$0.01266$0.01266
-11.96%
USD
MAY (MAY) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

The Channel Factories We’ve Been Waiting For

The Channel Factories We’ve Been Waiting For

The post The Channel Factories We’ve Been Waiting For appeared on BitcoinEthereumNews.com. Visions of future technology are often prescient about the broad strokes while flubbing the details. The tablets in “2001: A Space Odyssey” do indeed look like iPads, but you never see the astronauts paying for subscriptions or wasting hours on Candy Crush.  Channel factories are one vision that arose early in the history of the Lightning Network to address some challenges that Lightning has faced from the beginning. Despite having grown to become Bitcoin’s most successful layer-2 scaling solution, with instant and low-fee payments, Lightning’s scale is limited by its reliance on payment channels. Although Lightning shifts most transactions off-chain, each payment channel still requires an on-chain transaction to open and (usually) another to close. As adoption grows, pressure on the blockchain grows with it. The need for a more scalable approach to managing channels is clear. Channel factories were supposed to meet this need, but where are they? In 2025, subnetworks are emerging that revive the impetus of channel factories with some new details that vastly increase their potential. They are natively interoperable with Lightning and achieve greater scale by allowing a group of participants to open a shared multisig UTXO and create multiple bilateral channels, which reduces the number of on-chain transactions and improves capital efficiency. Achieving greater scale by reducing complexity, Ark and Spark perform the same function as traditional channel factories with new designs and additional capabilities based on shared UTXOs.  Channel Factories 101 Channel factories have been around since the inception of Lightning. A factory is a multiparty contract where multiple users (not just two, as in a Dryja-Poon channel) cooperatively lock funds in a single multisig UTXO. They can open, close and update channels off-chain without updating the blockchain for each operation. Only when participants leave or the factory dissolves is an on-chain transaction…
Share
BitcoinEthereumNews2025/09/18 00:09
SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime

The post SOLANA NETWORK Withstands 6 Tbps DDoS Without Downtime appeared on BitcoinEthereumNews.com. In a pivotal week for crypto infrastructure, the Solana network
Share
BitcoinEthereumNews2025/12/16 20:44
XRP ETFs pass $1 billion mark with no outflow days since launch

XRP ETFs pass $1 billion mark with no outflow days since launch

Markets Share Share this article
Copy linkX (Twitter)LinkedInFacebookEmail
XRP ETFs pass $1 billion mark with no outflo
Share
Coindesk2025/12/16 19:01