A chilling new cybersecurity threat is emerging from the shadows, one that uses the familiar interface of a video call to empty cryptocurrency wallets. Security experts are sounding the alarm about a sophisticated social engineering campaign attributed to North Korean state-linked hackers, which has already siphoned an estimated $300 million from the crypto ecosystem.
This isn’t a simple phishing email. It’s a multi-layered deception that exploits trust and routine business practices. The Security Alliance (SEAL) warns that these attempts are now happening “multiple daily”, targeting employees, developers, and executives at crypto firms.
A Con Built on Trust and Deepfakes
The scam typically begins on platforms like Telegram, where attackers either hijack an existing account or impersonate a trusted colleague. Posing as someone the victim knows, they propose a meeting using a professional scheduling link. Once the victim joins the Zoom call, the illusion is complete.
In a particularly advanced twist, hackers have employed AI-generated deepfake videos of company executives to build trust during the meeting. During the conversation, the attacker stages a technical issue, often complaining about poor audio. They then “helpfully” send a file through the chat, claiming it’s a necessary software update or patch to fix the problem. This file is, in reality, a malicious payload.
The Malware That Opens the Vault
Clicking that file installs a remote access trojan (RAT) or information-stealer onto the victim’s computer. Groups like BlueNoroff (part of the larger Lazarus Group) and TraderTraitor deploy custom-built malware such as NimDoor or BeaverTail. Once inside, this software can log every keystroke, capture screen activity, and—most critically—plunder data from cryptocurrency wallets and browser extensions.
The malware is designed to hunt for sensitive information, including passwords and, most importantly, the private keys that control crypto assets. With these keys in hand, the attackers can systematically drain wallets, often transferring the stolen funds through complex chains of mixers and exchanges to obscure their trail.

Next verified milestone or synthesis
For individuals and companies in the crypto space, vigilance and proactive security are non-negotiable. The industry has moved into an era where operational and human security failures can be a greater risk than pure technical exploits. Here are critical steps to take:
First, adopt a policy of zero trust for unscheduled meeting requests. Always verify the identity of a contact through a separate, established channel before joining a call, especially if they send you a file. Be extremely suspicious of anyone who refuses to communicate over official email or channels.
Second, harden your technical environment. Disable unnecessary features like Zoom’s “remote control” function, which attackers can abuse. Use strong endpoint protection and ensure all software is updated. For organizations, enforcing multi-factor authentication with security keys, rather than SMS, for all critical accounts creates a powerful barrier that social engineering cannot easily bypass.
The “fake Zoom” campaign is a stark reminder that in the high-stakes world of cryptocurrency, your greatest vulnerability may not be your smart contract code, but the human tendency to trust a familiar face on a screen. By combining skepticism with robust security practices, the community can defend against these costly deceptions.

