North Korean hackers divert zoom calls to steal your crypto with scripts buried at 10,000 deep lines


  • Zoom’s false scripts launch malicious software hidden under thousands of lines of code and white space
  • Launchdaemons ensures that malware runs at start -up with administration rights once installed
  • Malventy components disguise themselves as legitimate tools such as “iCloud_Helper” and “Updater Wi-Fi”

A new cyber campaign using false target zoom applications of organizations in North America, Europe and Asia-Pacific, have warned experts.

This cyber campaign, linked to the North Korean pirates, is awarded to the Bluenoroff group, a known a subsidiary of the infamous Lazare group, and the Usurpations of Legitimate Video Conference Services to deceive the victims.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top