Blog

Crypto Founders reported North Korean fake zoom hacking attempts


At least three Crypto founders reported a foiling of an attempt from North Korea’s alleged hackers to steal sensitive data through fake call calls in recent days.

Nick Bax, a member of the White Hat Hacker Group The Security Alliance, is said on a March 11 x Post The technique used by North Korea scammers found millions of dollars stolen from suspected victims.

Usually, the Scammers will contact A target with the offer to the meeting or collaboration, but once the call begins, they send a message surprising to audio issues while a stock video of a bored capitalist venture is on screen; Then they send a link to a new call, according to Bax.

“It’s a fake link and teaches the target to install a patch to fix their audio/video,” Bax said.

“They take advantage of human psychology. You think you are meeting with important VCs and in a hurry to fix the audio, causing you to be less careful than you are. When you install the patch, you are rectangular.”

The post prompted some crypto founders to detail their scam experiences.

Giulio Xiloyannis, co-founder of blockchain gaming mon protocol, Says The scammers tried to dupe him and the marketing leader with a meeting about a cooperation opportunity.

However, he was alerted to the Ruse when, in the last minute, he motioned for a zoom link that “pretending to not read your audio to make you install malware.”

“Once I saw a partner in gumicryptos speaking and a superstate I realized something was gone,” he said.

Source: Giulio xiloyannis

David Zhang, co-founder with us Venture-Supported Stablecoin Stably, that is also targeting. She is Says Scammers used his Google Meet Link but then made a reason about an internal conference, asked him to join that meeting.

“The site acted like a normal pag -zoom call. I took the call to my tablet though, so not sure what to do with the desktop,” Zhang said.

“It may have tried to determine the OS before motivating the user to do something, but it was not just built for mobile OSE.”

Source: David Zhang

Melbin Thomas, founder of Devdock AI, a decentralized AI platform for Web3 projects, Says He also has that scam and not sure if his tech is still at risk.

“The same thing happened to me. But I didn’t give my password as the installation occurred,” he said.

“Disconnect my laptop and I reset to factory settings. But moved my files to a hard drive. I haven’t connected the hard drive back to my laptop. Is it still infected?”

Related: Fake Zoom Malware steals crypto while it’s ‘stuck’ loading, the user warns

It came after the US, Japan and South Korea on January 14th released a joint warning against the growing threat Cryptocurrency hackers have stated associated with North Korea hackers.

Groups like Lazarus Group are prime suspects in some of the largest robbery in Cyber ​​on the web3, including The bybit $ 1.4 billion hack And the Ron’s $ 600 million network Hack.

The Lazarus group moves to crypto assets using mixers following a string of high-profile hacks, According to Blockchain Security Firm Certikwho saw a deposit of 400 ether (Eth) costs nearly $ 750,000 in Tornado Cash Mixing Service.

Magazine: Lazarus Group’s favorite exploitation is revealed – Crypto hacks review