Crypto Catastrophe: How Deepfake CEOs and Fake Zoom Calls are Unleashing Malware Mayhem
BlueNoroff is at it again! This North Korea-aligned group duped a Web3 employee with deepfaked Zoom calls, leaving their macOS device swimming in malware. Their sneaky tactics involve fake executives urging the employee to download a malicious Zoom extension. Keep an eye on those Zoom calls, folks, especially if Kim Jong-un RSVPs!

Hot Take:
Well, folks, it seems North Korea’s BlueNoroff group is taking a page out of a sci-fi novel—deepfakes and Zoom calls to scam people? What’s next, holographic Nigerian princes? Apparently, the art of deception now includes impersonating high-ranking company officials in a bid to trick employees into downloading malware. Can’t help but wonder if they used the deepfakes for karaoke after the call…
Key Points:
- BlueNoroff, part of the infamous Lazarus Group, targets Web3 sector employees with deepfake Zoom calls.
- The attack involves a fake Zoom domain and a malicious AppleScript to compromise macOS devices.
- The malicious payload includes multiple backdoors, keyloggers, and cryptocurrency stealers.
- BlueNoroff, also known as TraderTraitor, continues to evolve and split into new groups for financial theft.
- Recent campaigns use fake job ads and Python-based malware to target various platforms.
Already a member? Log in here