‘The attacker completed in under five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to target crypto execs



  • State-sponsored attackers crafted convincing fake video calls to target cryptocurrency firms
  • A clipboard hijack trick replaced benign commands with malware‑deploying code
  • The operation enabled rapid credential theft, persistence, and full system compromise

Security researchers Arctic Wolf have revealed details of a highly sophisticated campaign targeting North American Web3 and cryptocurrency companies.

It is conducted by state-sponsored threat actors called BlueNoroff, a financially motivated subgroup of the dreaded North Korean Lazarus Group, with a goal of establishing persistent access on their target’s devices.



Source link

The post ‘The attacker completed in under five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to target crypto execs first appeared on TechToday.

This post originally appeared on TechToday.

Leave a Reply

Your email address will not be published. Required fields are marked *