SEAL Warns of Daily Fake Zoom Attacks as DPRK Hackers Weaponize Familiar Faces


A fake Zoom “update” is all it takes for hackers to seize crypto funds, cloud credentials, and entire Telegram accounts.

Cybersecurity firm, Security Alliance (SEAL), said it is tracking multiple daily attempts by North Korean-linked threat actors using so-called “fake Zoom” or “fake Teams” meetings to distribute malware and expand access to new victims.

The non-profit reshared a detailed warning from security researcher Taylor Monahan outlining how the attacks unfold and the scale of losses involved.

Fake Zoom Calls, Real Losses

Monahan said the campaign begins with a message from a compromised Telegram account belonging to someone the victim already knows. These often have prior conversation history intact, which lowers suspicion and leads to an invitation to reconnect via a video call scheduled through a shared link.

During the call, victims are shown what appear to be legitimate participants, using real recordings sourced from previously hacked accounts or public material rather than deepfakes, before attackers claim technical issues and instruct targets to apply an update or fix.

The file or command provided, usually disguised as a Zoom software development kit (SDK) update, installs malware that quietly compromises the device across Mac, Windows, and Linux systems. This allows attackers to exfiltrate cryptocurrency wallets, passwords, private keys, seed phrases, cloud credentials, and Telegram session tokens.

She said more than $300 million has already been stolen using the method, and attackers often delay further contact to avoid detection after the initial infection. SEAL said social engineering is central to the campaign, while adding that victims are reassured repeatedly when they express concern and are encouraged to proceed quickly to avoid wasting the apparent contact’s time.

Monahan warned that once a device is compromised, attackers take control of the victim’s Telegram account and use it to message contacts and repeat the scam. This creates a cascading effect through professional and social networks.

You may also like:

The researcher urged anyone who has clicked a suspicious link to immediately disconnect from the internet, turn off the affected device, and avoid using it, secure funds using another device, change passwords and credentials, and completely wipe the compromised computer before reuse. She also stressed the need to secure Telegram by terminating all other sessions from a phone, updating passwords, and enabling multifactor authentication to prevent further spread.

Lazarus-Style Tactics

In the past year, several platforms have flagged phishing campaigns using fake Zoom meeting links to steal millions in cryptocurrency. Binance founder Changpeng “CZ” Zhao warned about rising AI deepfake scams after crypto influencer Mai Fujimoto was hacked during a fake Zoom call. Attackers used a deepfake impersonation and a malicious link to install malware, which compromised her Telegram, MetaMask, and X accounts.

Bitget CEO Gracy Chen also warned of a growing wave of phishing attacks using fake Zoom and Microsoft Teams meeting invitations to target crypto professionals. Last week, Chen said attackers pose as legitimate meeting hosts, often contacting victims via Telegram or fake Calendly links.

During the call, they claim audio or connection issues and urge targets to download a supposed network update or SDK, which is actually malware designed to steal passwords and private keys. Chen said the tactic mirrors methods used by the Lazarus group and explained that scammers have impersonated Bitget representatives.

SPECIAL OFFER (Exclusive)

SECRET PARTNERSHIP BONUS for CryptoPotato readers: Use this link to register and unlock $1,500 in exclusive BingX Exchange rewards (limited time offer).

Source link

Chayanika Deka

https://cryptopotato.com/seal-warns-of-daily-fake-zoom-attacks-as-dprk-hackers-weaponize-familiar-faces/

2025-12-15 21:05:00

bitcoin
Bitcoin (BTC) 7,033,265.90 4.10%
ethereum
Ethereum (ETH) 238,665.46 6.53%
tether
Tether (USDT) 81.82 0.02%
bnb
BNB (BNB) 69,907.17 3.92%
xrp
XRP (XRP) 153.01 6.46%
usd-coin
USDC (USDC) 81.82 0.02%
solana
Wrapped SOL (SOL) 10,325.49 4.34%
tron
TRON (TRX) 22.81 0.76%
staked-ether
Lido Staked Ether (STETH) 238,594.27 6.47%
dogecoin
Dogecoin (DOGE) 10.55 5.64%
figure-heloc
Figure Heloc (FIGR_HELOC) 84.36 1.88%
cardano
Cardano (ADA) 31.19 5.67%
whitebit
WhiteBIT Coin (WBT) 4,717.21 3.89%
wrapped-steth
Wrapped stETH (WSTETH) 291,675.77 6.50%
wrapped-bitcoin
Wrapped Bitcoin (WBTC) 7,019,764.78 3.98%
bitcoin-cash
Bitcoin Cash (BCH) 43,492.43 6.16%
wrapped-beacon-eth
Wrapped Beacon ETH (WBETH) 259,135.61 6.42%
usds
USDS (USDS) 81.82 0.01%
binance-bridged-usdt-bnb-smart-chain
Binance Bridged USDT (BNB Smart Chain) (BSC-USD) 81.81 0.01%
chainlink
Chainlink (LINK) 1,040.00 6.67%
wrapped-eeth
Wrapped eETH (WEETH) 258,832.04 6.42%
leo-token
LEO Token (LEO) 754.43 0.47%
monero
Monero (XMR) 33,531.06 2.26%
weth
WETH (WETH) 238,630.27 6.49%
hyperliquid
Hyperliquid (HYPE) 2,164.27 8.94%
stellar
Stellar (XLM) 17.79 6.61%
zcash
Zcash (ZEC) 32,448.51 1.60%
ethena-usde
Ethena USDe (USDE) 81.79 0.06%
coinbase-wrapped-btc
Coinbase Wrapped BTC (CBBTC) 7,035,393.35 4.11%
litecoin
Litecoin (LTC) 6,328.34 4.39%
sui
Sui (SUI) 119.46 7.17%
avalanche-2
Avalanche (AVAX) 997.45 7.82%
hedera-hashgraph
Hedera (HBAR) 9.28 5.39%
usdt0
USDT0 (USDT0) 81.80 0.03%
susds
sUSDS (SUSDS) 89.11 0.90%
shiba-inu
Shiba Inu (SHIB) 0.000637 5.26%
dai
Dai (DAI) 81.80 0.01%
mantle
Mantle (MNT) 103.92 2.38%
paypal-usd
PayPal USD (PYUSD) 81.82 0.07%
the-open-network
Toncoin (TON) 122.74 3.88%
world-liberty-financial
World Liberty Financial (WLFI) 10.80 5.25%
crypto-com-chain
Cronos (CRO) 7.69 3.59%
ethena-staked-usde
Ethena Staked USDe (SUSDE) 99.01 0.02%
uniswap
Uniswap (UNI) 409.12 7.37%
polkadot
Polkadot (DOT) 154.65 5.92%
memecore
MemeCore (M) 140.74 2.70%
aave
Aave (AAVE) 15,271.00 4.25%
usd1-wlfi
USD1 (USD1) 81.75 0.02%
rain
Rain (RAIN) 0.630869 2.65%
canton-network
Canton (CC) 5.85 3.16%