Crypto Catastrophe: How Deepfake CEOs and Fake Zoom Calls are Unleashing Malware Mayhem

BlueNoroff is at it again! This North Korea-aligned group duped a Web3 employee with deepfaked Zoom calls, leaving their macOS device swimming in malware. Their sneaky tactics involve fake executives urging the employee to download a malicious Zoom extension. Keep an eye on those Zoom calls, folks, especially if Kim Jong-un RSVPs!

Pro Dashboard

Hot Take:

Well, folks, it seems North Korea’s BlueNoroff group is taking a page out of a sci-fi novel—deepfakes and Zoom calls to scam people? What’s next, holographic Nigerian princes? Apparently, the art of deception now includes impersonating high-ranking company officials in a bid to trick employees into downloading malware. Can’t help but wonder if they used the deepfakes for karaoke after the call…

Key Points:

  • BlueNoroff, part of the infamous Lazarus Group, targets Web3 sector employees with deepfake Zoom calls.
  • The attack involves a fake Zoom domain and a malicious AppleScript to compromise macOS devices.
  • The malicious payload includes multiple backdoors, keyloggers, and cryptocurrency stealers.
  • BlueNoroff, also known as TraderTraitor, continues to evolve and split into new groups for financial theft.
  • Recent campaigns use fake job ads and Python-based malware to target various platforms.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?