On December 15, the cybersecurity non-profit organization Security Alliance warned that they are currently discovering multiple scam attempts initiated by North Korean hackers every day. These attacks deceive victims through fake Zoom meetings. The scam involves誘導 victims to download malware during a “fake Zoom call,” thereby stealing sensitive information including passwords and private keys. Security researcher Taylor Monahan warned that this tactic has already stolen over $300 million in assets from users. The scam usually begins with a message sent from a Telegram account that often belongs to someone the victim knows. Due to the familiar identity, victims tend to let their guard down. Subsequently, the conversation naturally transitions to an invitation to “catch up via Zoom.” Once the call begins, hackers pretend to encounter audio problems and send a so-called “patch file.” When victims open the file, their devices are infected with malware. The hackers then end the fake call with the excuse of “rescheduling for another day.”
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Security Company: North Korean Hackers' "Fake Zoom" Software Attacks Have Become a Daily Threat, Stealing Over $300 Million in Assets
On December 15, the cybersecurity non-profit organization Security Alliance warned that they are currently discovering multiple scam attempts initiated by North Korean hackers every day. These attacks deceive victims through fake Zoom meetings. The scam involves誘導 victims to download malware during a “fake Zoom call,” thereby stealing sensitive information including passwords and private keys. Security researcher Taylor Monahan warned that this tactic has already stolen over $300 million in assets from users. The scam usually begins with a message sent from a Telegram account that often belongs to someone the victim knows. Due to the familiar identity, victims tend to let their guard down. Subsequently, the conversation naturally transitions to an invitation to “catch up via Zoom.” Once the call begins, hackers pretend to encounter audio problems and send a so-called “patch file.” When victims open the file, their devices are infected with malware. The hackers then end the fake call with the excuse of “rescheduling for another day.”