‘Attacker was done in less than five minutes’: Experts warn of North Korea-linked campaign using fake Zoom meetings to target crypto executives


  • State-sponsored attackers have crafted convincing fake video calls to target cryptocurrency companies.
  • Clipboard hijacking trick replaced harmless commands with malware-deploying code
  • The operation enabled rapid credential theft, persistence, and complete system compromise.

Security researchers Arctic Wolf have revealed details of a highly sophisticated campaign targeting North American Web3 and cryptocurrency companies.

It is carried out by state-sponsored malicious actors called BlueNoroff, a financially motivated subgroup of the feared North Korean Lazarus group, with the aim of establishing persistent access to their target’s devices.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top