Deepfake Zoom Scams Hit Crypto Insiders as BTC Prague Co-Founder Warns of Mac Malware

BTC-2,48%

Key Takeaways:

  • Crypto insiders are being targeted by deepfake video calls that deliver macOS malware
  • BTC Prague co-founder Martin Kuchař says his stolen Telegram account was used to spread the attack
  • The campaign matches tactics tied to North Korea–linked BlueNoroff hackers

A crypto scam wave with a highly-targeted level is exploiting deepfake video, relationship contacts and popular work tools. BTC Prague co-founder, Martin Kuchař disclosed that attackers controlled his Telegram account to lure others into Zoom and Teams video call with malware.

Read More: $50M Vanishes in Seconds: Copy-Paste Wallet Error Triggers One of Crypto’s Costliest Address Scams

Table of Contents

  • Deepfake Video Calls Used as the Entry Point
  • North Korea–Linked Malware Chain Targets Mac Users
    • How the Mac Infection Works
    • Crypto Theft Campaigns Grow More Sophisticated

Deepfake Video Calls Used as the Entry Point

Kuchař warned that the attacks often start with messages from trusted contacts on Telegram or other platforms. The victims receive an invitation to discuss the matter or also have a quick sync in a Zoom or Microsoft Teams call.

After getting the call, the attackers impersonate the trusted person through AI-generated deepfake video. They state that there is an audio problem and request the victim to install a given plug in or file so as to resolve the issue. That file gives attackers full access to the system.

According to Kuchař, this method led to the theft of Bitcoin, takeover of Telegram accounts, and further spread of the scam through hijacked identities. He urged users to treat all Telegram messages as untrusted and to avoid unverified Zoom or Teams calls.

Read More: Hackers Hijack Binance Co-CEO Yi He’s WeChat to Push Meme Coin Scam, Triggering Market Frenzy

North Korea–Linked Malware Chain Targets Mac Users

Technical details shared by Kuchař align with research from cybersecurity firm Huntress, which traced similar attacks to BlueNoroff, a hacking group linked to North Korea’s Lazarus Group.

How the Mac Infection Works

The attack starts with a spoofed Zoom domain with a faked meeting link. When victims are making the call, they are advised to download a file named Zoom support script. Actually, the file is infected by AppleScript, which starts a multi-stage attack.

The malware toolkit will consist of:

  • Telegram 2, a fake updater that maintains persistence
  • Root Troy V4, a remote-access backdoor
  • InjectWithDyld, a stealth loader for encrypted payloads
  • XScreen, a surveillance tool that logs keystrokes and screen activity
  • CryptoBot, an infostealer targeting more than 20 crypto wallets

Researchers indicate that the malware will leverage valid developer signatures and place Rosetta on Apple Silicon devices in order to evade identification. This renders the attack less detectable, particularly to the Mac users who have a false sense of security that their respective systems are less vulnerable.

Crypto Theft Campaigns Grow More Sophisticated

Huntress researchers point out that Mac is an excellent target because an increasing number of crypto groups deploy Macs to the enterprise. Deepfake video injects strongly in the credibility equation, combining real-time images with the known platform.

Basic security habits revealed by Kuchař assisted in curtailing his losses. He emphasized the use of two-factor authentication, password solution, and hardware wallets. He also recommended more secure communication tools, such as Signal or Jitsi, and better browsers over more secure calls, such as Google Meet due to greater sandboxing.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Articoli correlati

Iran Uses Bitcoin for Hormuz Strait Oil Transit Fees, But Stablecoins Handle Majority of Actual Fund Transfers

Iran is utilizing Bitcoin for oil transit fee settlements via the Strait of Hormuz, but stablecoins dominate actual fund transfers in these transactions.

GateNews1h fa

Galaxy Research Chief: U.S. OFAC Sanctions List Involves 518 Bitcoin Addresses

The U.S. Treasury's OFAC sanctions list includes 518 Bitcoin addresses that have significantly engaged in crypto transactions, currently holding about 9,306 BTC valued at $707 million, highlighting the relationship between cryptocurrency and financial regulation.

GateNews5h fa

Bitcoin Swings on Hormuz Strait Reports, Triggering $762M in Liquidations

Bitcoin rose to $78,000 but dropped to $76,091 following reports of tensions in the Strait of Hormuz. Iran's actions triggered $762 million in liquidations among traders, with implications for crypto markets as Iran accepts payments in bitcoin and other currencies to navigate sanctions.

GateNews7h fa

Former UK PM Liz Truss Publicly Endorses Bitcoin as Tool Against Currency Debasement

Former UK Prime Minister Liz Truss criticized Britain's economic trajectory, citing high taxes and regulations. She advocates for Bitcoin to combat currency debasement and is organizing a conference to promote a movement for sovereignty and freedom.

GateNews19h fa

BTC 跌破 76000 USDT

Gate News bot 消息,Gate 行情显示,BTC 跌破 76000 USDT,现价 75996.9 USDT。

CryptoRadar20h fa
Commento
0/400
Nessun commento