‘The attacker completed in under five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to target crypto execs



  • State-sponsored attackers crafted convincing fake video calls to target cryptocurrency firms
  • A clipboard hijack trick replaced benign commands with malware‑deploying code
  • The operation enabled rapid credential theft, persistence, and full system compromise

Security researchers Arctic Wolf have revealed details of a highly sophisticated campaign targeting North American Web3 and cryptocurrency companies.

It is conducted by state-sponsored threat actors called BlueNoroff, a financially motivated subgroup of the dreaded North Korean Lazarus Group, with a goal of establishing persistent access on their target’s devices.

https://cdn.mos.cms.futurecdn.net/kDLU9By5uaPPbwrbfEaZFJ-2560-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img