‘Attacker completed in less than five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to attack cryptocurrency executives



  • State-sponsored attackers created convincing fake video calls to target cryptocurrency companies
  • Clipboard hijacking hack replaced benign commands with malware deployment code
  • The operation enabled rapid credential theft, persistence, and full system compromise.

Security researchers Arctic Wolf have revealed details of a highly sophisticated campaign targeting North American Web3 and cryptocurrency companies.

It is carried out by state-sponsored threat actors called BlueNoroff, a financially motivated subgroup of North Korea’s feared Lazarus Group, with the goal of establishing persistent access on their target’s devices.

Leave a Comment

Your email address will not be published. Required fields are marked *