Non Cult Crypto News

Non Cult Crypto News

in

Crypto founders report deluge of North Korean fake Zoom hacking attempts

Crypto entrepreneurs David Zhang and Giulio Xiloyannis say they were both targeted by hackers.

COINTELEGRAPH IN YOUR SOCIAL FEED

At least three crypto founders have reported foiling an attempt from alleged North Korean hackers to steal sensitive data through fake Zoom calls over the past few days. 

Nick Bax, a member of the white hat hacker group the Security Alliance, said in a March 11 X post the method used by North Korean scammers had seen millions of dollars stolen from suspecting victims. 

Generally, the scammers will contact a target with a meeting offer or partnership, but once the call starts, they send a message feigning audio issues while a stock video of a bored venture capitalist is on the screen; they then send a link to a new call, according to Bax. 

“It’s a fake link and instructs the target to install a patch to fix their audio/video,” Bax said. 

“They exploit human psychology, you think you’re meeting with important VCs and rush to fix the audio, causing you to be less careful than you usually are. Once you install the patch, you’re rekt.” 

The post prompted several crypto founders to detail their experiences with the scam.

Giulio Xiloyannis, co-founder of the blockchain gaming Mon Protocol, said scammers tried to dupe him and the head of marketing with a meeting about a partnership opportunity.  

However, he was alerted to the ruse when, at the last minute, he was prompted to use a Zoom link that “pretends to not be able to read your audio to make you install malware.”

“The moment I saw a Gumicryptos partner speaking and a Superstate one I realized something was off,” he said. 

Source: Giulio Xiloyannis

David Zhang, co-founder of US venture-backed stablecoin Stably, was also targeted. He said the scammers used his Google Meet link but then made up an excuse about an internal meeting, asking him to join that meeting instead.

“The site acted like a normal Zoom call. I took the call on my tablet though, so not sure what the behavior would’ve been on desktop,” Zhang said. 

“It probably tried to determine the OS before prompting the user to do something, but it just wasn’t built for mobile Oses.” 

Source: David Zhang

Melbin Thomas, founder of Devdock AI, a decentralized AI platform for Web3 projects, said he was also hit with the scam and was unsure if his tech was still at risk.  

“The same thing happened to me. But I didn’t give my password while the installation was happening,” he said. 

“Disconnected my laptop and I reset to factory settings. But transferred my files to a hard drive. I have not connected the hard drive back to my laptop. Is it still infected?” 

Related: Fake Zoom malware steals crypto while it’s ‘stuck’ loading, user warns

This comes after the US, Japan and South Korea on Jan. 14 issued a joint warning against the growing threat presented by cryptocurrency hackers associated with North Korean hackers. 

Groups such as the Lazarus Group are prime suspects in some of the biggest cyber thefts in Web3, including the Bybit $1.4 billion hack and the $600 million Ronin network hack.

The Lazarus Group has been moving crypto assets using mixers following a string of high-profile hacks, according to blockchain security firm CertiK, which detected a deposit of 400 Ether (ETH) worth around $750,000 to the Tornado Cash mixing service. 

Magazine: Lazarus Group’s favorite exploit revealed — Crypto hacks analysis

This article first appeared at Cointelegraph.com News

What do you think?

Written by Outside Source

Lazarus Group sends 400 ETH to Tornado Cash, deploys new malware

Ethereum ‘falling knife’ warning: Is another 30% crash versus Bitcoin coming?

Back to Top

Ad Blocker Detected!

We've detected an Ad Blocker on your system. Please consider disabling it for Non Cult Crypto News.

How to disable? Refresh

Log In

Or with username:

Forgot password?

Don't have an account? Register

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

To use social login you have to agree with the storage and handling of your data by this website.

Add to Collection

No Collections

Here you'll find all collections you've created before.